Threat intelligent with honeypot :
cutting-edge system that integrates with Blue Wireless, Twilio and StoryBlok to provide real-time threat intelligence detection of cyber attacks.
Our system employs the use of honeypots, both internal and external, to effectively detect and respond to potential threats.
The internal components of the system include the ESP Node 32, which acts as a honeypot to lure in potential attackers.
The external components include a virtual machine honeypot that provides an added layer of defense.
WHAT DO OUR PROJECT DO?
When a hacker attacks the system, the first point of contact will be the honeypot.
This will trigger an alert that informs the system's owner via SMS or WhatsApp message, providing them with valuable information about the attack and allowing them to take proactive measures to prevent further damage.
VISION & MISSION
USE OF HONEYPOT :
INTERNAL HONEYPOT
[+]In the internal network, we recognize the potential for intruders to penetrate the network.
[+]To address this, we have implemented an internal wifi honeypot that acts as a normal access point and records IP addresses and BSS IDs.
[+]This allows us to identify and block unauthorized IP addresses, enhancing the overall security of the internal network and organization.
EXTERNAL HONEYPOT
[+]In the external network, organizations are constantly facing cyberattacks on their network and web services.
[+]To identify and block these attackers, we have set up an intentionally vulnerable honeypot.
[+]This honeypot allows hackers to attack it and records all their IP addresses, port numbers, and the services they use.
[+]With this information, we can effectively block the attacker's IP address, ensuring that they cannot access the real network and compromising the security of the organization.
Challenges we ran into ESP Node 32 and a Raspberry Pi integration with our code, as we were facing a little misconfiguration while we were
Technologies used
Discussion