Skip to content

fabianvagi91/Honeypot

Repository files navigation

For my second project, I decided to explore different honeypots. A honeypot is a cybersecurity mechanism and is used to open ports so we can attract malicious actors. They also gather intelligence about our attacker, identity, and methods. I chose Pentbox because of its GUI which makes it straightforward.

Honeypot

Automatic and Manual Honeypot using Pentbox

image alt

Installation from https://github.com/technicaldada/pentbox uncompressing and execution of Pentbox For the Honeypot configuration, it is important to execute as root user.

image alt

In the menu, we can see all the options available that we can do. I choose option 2 Network tools and inside I choose 3 which is Honeypot For the first time using this tool, I wanted the configuration not to have to be an issue so I chose the first option Fast Auto Configuration. Fast Auto Configuration opens the port 80 HTTP.

image alt

For testing purposes, i opened my Firefox and entered 127.0.0.1:80 And receive notifications from the honeypot that has been an intrusion. Here are the logs and we have useful information about the attempt. (which OS was used by the attacker, browser, and time)

image alt

After realizing how this tool behaves I wanted to customize my honeypot configuration. I selected the option Manual Configuration and chose to open port 22 SSH. Also customized my message to the intruder, name, and location of the log file and alarms with sound.

image alt

For testing the honeypot i needed to know the ip of the honeypot (the ip of the virtual machine)

image alt

And i used nmap to see if the port 22 its open (means that my honeypot is running in this port) After using the nmap tool we generate logs into our honeypot.

image alt

Inside the directory of pentbox we can see the logs of the honeypot that i made in port 22. When i open the file i see the alerts made during the testing.

!IMPORTANT!

Pentbox only works when the terminal is runnning

Conclusion

During the research, I read extensively about different types of honeypots and their capabilities.

I learned much more about well-known ports and reinforced my knowledge of firewall rules and network protocols.

I practiced reading logs and extracting useful information from them.

About

Automatic and Manual Honeypot using Pentbox

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published