From the course: IT Security Foundations: Network Security

Unlock the full course today

Join today to access over 24,900 courses taught by industry experts.

Examining honeypot findings

Examining honeypot findings

- [Narrator] Many times, if you get an out of the box honeypot, it contains logging capabilities. The honeypot acts as a sniffer and gathers data while it's traveling through the network and in the honeypot. Now that information can be stored and then used for forensic purposes. Let's take a look. Here, I have a pre captured packet that we can use to dig down and see some of the evidence contained in the capture file. I've opened it up in Wireshark, a free protocol analysis tool. Now, when you take a look at a capture file or a log file or any evidence that you get where you're concerned about an indication of compromise, the information doesn't always stand out. You have to take a look and then do further analysis. For this, what I'm going to do is go to statistics and conversations. Now, once here, I'll go to TCP, and then I'm going to sort by port A, because what I'm looking for is specific ports that could be associated with malicious activity. Now I'll scroll down, and here I'm…

Contents