{"id":238,"date":"2006-07-11T04:48:32","date_gmt":"2006-07-11T04:48:32","guid":{"rendered":"https:\/\/www.darknet.org.uk\/2006\/07\/honeybot-a-windows-based-honeypot\/"},"modified":"2010-06-18T12:06:29","modified_gmt":"2010-06-18T11:06:29","slug":"honeybot-a-windows-based-honeypot","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2006\/07\/honeybot-a-windows-based-honeypot\/","title":{"rendered":"HoneyBot – A Windows Based Honeypot"},"content":{"rendered":"

<\/p>\n

HoneyBOT<\/strong><\/p>\n

HoneyBOT is a Windows based medium interaction honeypot solution.<\/p>\n

What is a Honeypot?<\/strong><\/p>\n

A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the keystrokes and mistakes made by hackers. The captured information is highly valuable as it contains only malicious traffic with little to no false positives.<\/p>\n

Honeypots are becoming one of the leading security tools used to monitor the latest tricks and exploits of hackers by recording their every move so that the security community can more quickly respond to new exploits.<\/p>\n

How it Works<\/strong><\/p>\n

HoneyBOT works by opening over 1000 udp and tcp listening sockets on your computer and these sockets are designed to mimic vulnerable services. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Should an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot environment will safely store these files on your computer for analysis and submission to antivirus vendors. Our test server has captured several thousand trojans and rootkits from these simulated services including:<\/p>\n