- Rushawn White - 2002469
- Tori Horne - 2002633
- Daryn Brown - 2002414
- Form groups consisting of no more than four (4) students
- Review the following case study and perform the tasks indicated below
- Response submissions must be made to the respective tutor’s folder found in the Google Drive link below by the due date
- Unsubmitted reports will result in failure. Please note not every member of the group will receive the same grade.
You're responsible for the security of Xen Tech Limited a large IT company in Jamaica. Due to a recent increase in cyber-attacks against the company’s webserver, the management has suggested that you implement a system to detect and track potential attackers who are trying to break into the network. You decide to set up a honeypot to lure attackers into revealing their tactics and techniques.
You desire to configure the honeypot to mimic a vulnerable server that's commonly targeted by attackers and place it on a separate network segment to prevent attackers from accessing your production systems. You also desire to set up monitoring and logging tools to capture and analyze all traffic to and from the honeypot.
- Write a python Honeypot that listens for incoming connections on multiple ports
(22, 80, and 443)
and logs any data received. [30 marks] - The honeypot should also include additional features such as packet capture, intrusion detection, and alerting. [20 marks]
- Write a report to share your findings to include source and destination IP addresses captured, any intrusions detect, possible vulnerabilities attackers were targeting and alerts etc [10 marks]
- Suggest ways to properly secure the honeypot to prevent attackers from using it to attack other systems if the organization is using only layer 2 switches. [10 marks]
Bonus
- Simulate how you would create a VLAN in Cisco Packet Tracer to segment the Honeypot from production systems assuming layer 2 switches are being used. [10 marks]