Welcome to the Bahria University DSpace digital repository. DSpace is a digital service that collects, preserves, and distributes digital material. Repositories are important tools for preserving an organization's legacy; they facilitate digital preservation and scholarly communication.
dc.contributor.author | Ali Nawaz Satti, 01-235171-005 | |
dc.contributor.author | Hamza Bin Saleem, 01-235171-018 | |
dc.date.accessioned | 2021-01-29T06:13:46Z | |
dc.date.available | 2021-01-29T06:13:46Z | |
dc.date.issued | 2021 | |
dc.identifier.uri | http://hdl.handle.net/123456789/10876 | |
dc.description | Supervised by Mr. Syed Sajjad Shah | en_US |
dc.description.abstract | We use honey pot as a tool to detect and collect new and unknown malwares. Once detected it would be easy for that we can easily get the required information about the malware and we can be able to locate the intruder. We can be able to get the source and destination IP and intruder also use different combinations of username and passwords. We can also log these usernames and password and through analysis of this log file we can be able to identify use some strong passwords. Honeypot is not an antivirus or firewall. It is basically a tool which helps in understanding, the cyberthreats through this we can be able to make our system more secure. We can be able to identify the location of the intruder. There are different types of honeypots and each of them have different types of functions for example to log brute force attacks and for network security a different types of honeypots are used as already mentioned every honeypot has its own specific functionality. Some of the main example of honeypots are email traps, decoy database, malware honeypot, spider honeypots and many others. Honeypot works on SSH and Telnet to log brute all the attacks performed by the hacker along this shell interaction of the attacker as well. We can also say our honeypot is specifically designed for SSH and Telnet. We are going to open these ports to make our system vulnerable for the attack and we done this by making module through programming by giving port number. These ports are 22 and 23 and as previously mentioned these ports are opened through programming module. Intruder can access through these ports and we can get the IP of the intruder and we can be able to locate the intruder through IP. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Computer Sciences BUIC | en_US |
dc.relation.ispartofseries | BS (IT);MFN-P 9085 | |
dc.subject | Malware Collector | en_US |
dc.title | Malware Collector in a Nutshell | en_US |
dc.type | Project Reports | en_US |