.IntroductionThe main goal of a honeypot is to be attacked and compromised. It distracts the attacker and obtains information about the attacker, the type of attack method he uses, and the resources he is attacking. A honeypot pretends to be vulnerable but is actually used in a highly controlled environment. It is therefore a false target for the attacker. All traffic to the honeypot is suspect because no production system is located on this resource. The data collected by the honeypot is therefore very interesting. A honeypot consists of a computer and a network site that appears to be part of the organization's network but is physically isolated and constantly monitored and appears to contain information useful to attackers. It can be seen as police luring a criminal and then conducting undercover surveillance. 2. Types of Honeypots Honeypots can be classified based on their design criteria and deployment. By deployment: Production honeypots These are generally low-interaction honeypots that are easy to deploy. They capture less information unlike more sophisticated research honeypots. These are placed on production servers by the organization to improve overall security. Research honeypots are used to gather information about organized criminals launching attacks on different organizations. They do not provide security but can be used to research threats organizations face and to analyze how to protect themselves from those threats. They are quite complex but capture extensive information and are mainly used by government and military organizations. Based on the design criteria they can be classified into the following... half of the sheet... copy into. Thus, we can trick the malware into thinking that the software honeypot is a removable drive. There is a driver in kernel mode that tells the operating system whether a particular driver is removable or not. It is known as disk.sys driver which inspects any new device. We then insert the ghost.bus driver into that driver to show that the honeypot software we have installed is a removable USB drive. Then, we can mount the virtual flash drive (the software honeypot) on demand to facilitate the idea of a removable device. Whatever API the malware uses, ghost.bus presents itself to the upper levels of the operating system as a removable drive. Therefore, whenever malware tries to copy itself to the virtual drive, it can be easily detected and removed. The important thing is that all malware uses social engineering to infect devices.
tags