DEV Community

Cover image for What is a honeypot and why might it be important?
Hunt Navar
Hunt Navar

Posted on

What is a honeypot and why might it be important?

If you have never worked or had an interest in cyber security, then the term "honeypot" might have a foreign meaning to you. As the name implies a honeypot lures hackers in with its sweet false hopes, hackers then unknowingly go after information not knowing they have enter a trap.

On the internet a honeypot might look like a badly built login page or some type of low hanging fruit that a hacker believes they can access and gather sensitive information from.

Image description

There are two places a honeypot usually is set when monitoring and discovering hackers. In enterprises firewalls are set to filter out a majority of hackers. Knowing this, our first inclination might to put our honeypot after the firewall. While this is certainly not the wrong assumption to have, the amount of knowledge gained by observing malignant actors actions drastically decreases.

The reasons to want the honeypot within your firewall would be regarding internal bad actors; while few, they would not be monitored or even discovered.
Image description

One of the best all encompassing honeypots is called Tpot and can be examined here.https://github.com/telekom-security/tpotce

I would not download this on a personal computer as it takes a large amount of storage space; however, if you are working for an enterprise or have the storage space available, feel free to download for these cool features.

I AM NOT RESPONSIBLE FOR CHANGES MADE TO YOUR COMPUTER

Anyway, installation is very simple. Run these commands using Unbuntu 18.04 or higher. You will also need an Unbuntu server.

Image description
Also, if git isn't insatlled make sure to run

sudo yum install git

Let the installation continue until you are automatically signed into the Kabana dashboard.

You will have access to all the different honeypots Tpot has to offer! There is a tremendous amount of information accessible to you at this point so go through you dashboard and find your favorites!
Image description

Let your program run and see all the hackers come out for the honey! You can identify the passwords and usernames attempted which will allow you to protect yourself better.
Image description

Thanks for sticking along and reading; I hope you learned something unique!

Source: https://blog.24by7security.com/honeypots-and-how-they-can-secure-your-network?https://www.24by7security.com/cmmc&gclid=Cj0KCQjwiNSLBhCPARIsAKNS4_d9Fz14_8S8OcNl5Q69xNrsaOIFWZE5zD16fbDcbtTQ1oN8rkCS4zUaAqtoEALw_wcB
Source: https://usa.kaspersky.com/resource-center/threats/what-is-a-honeypot
Source: https://cyber-99.co.uk/t-pot-honeypot-framework-installation
Source:https://www.youtube.com/watch?v=0WUaI2pNiPI&t=494s

Top comments (0)