DSpace Repository

Tracing intruders using web application honeypot with metasploit contents

Show simple item record

dc.contributor.advisor Mustafa, Dr. Hossen Asiful
dc.contributor.author Boby, Alin
dc.date.accessioned 2018-12-22T08:34:13Z
dc.date.available 2018-12-22T08:34:13Z
dc.date.issued 2017-09-23
dc.identifier.uri http://lib.buet.ac.bd:8080/xmlui/handle/123456789/5036
dc.description.abstract In recent years, it is impossible to say that the system is fully secured with no vulnerability. Hacking professionals use techniques to hide their real identity and always sweep out log records before leaving in such a way that security expert cannot trace them. Researchers and network administrators have applied several approaches to monitor and analyze malicious tra c for malicious content by monitoring network components, aggregating IDS alerts, and using di erent types of honeypot. We propose a web application honeypot that contains undetectable encoded metasploit contents and integrated into real web application from di erent location. It can be exploited by an attacker using brute-force or SQL injection attacking method. Our algorithm detects attacking IP address and diverts them to honeypot. By logging in our honeypot system by brute-force method or commonly used user and password, attackers can nd hacked contents which can be thought as important and original. When they copy any of these contents to their system and try to open it, exploited code in les will run on attacker's system and give us backdoor through msfconsole immediately to control and analyze their hardware and software resources, tools, and activities. We collect and store all activities and resources information of the intruder system into database. Analysis of the stored information can give insights into attacking methodologies, techniques and levels; such insights can help us to design more secured system. en_US
dc.language.iso en en_US
dc.publisher Institute of Information and Communication Technology en_US
dc.subject Hacking en_US
dc.title Tracing intruders using web application honeypot with metasploit contents en_US
dc.type Thesis-MSc en_US
dc.contributor.id 0411312014 en_US
dc.identifier.accessionNumber 116854
dc.contributor.callno 005.8/ALI/2017 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search BUET IR


Advanced Search

Browse

My Account