Assignment set up a honeypot virtual machine:
Download the T-Pot ISO file calledtpot_amd64.iso(reference link below). Then, create a new VM with at least 20GB ofstorage in your local Virtual Box installation and install T-Pot(standalone installation). Remember to assign the ISO file to theoptical drive.
GitHub project page:https://github.com/telekom-security/tpotce/releases
Installation:https://github.security.telekom.com/2015/03/honeypot-tpot-concept.html#installation
Use a NAT adapter during the installation. When finished, change itto Internal. Configure the Virtual Box adapter and the networkinterface in T-Pot so that you can communicate from your Kali LinuxVM. Show that a ping works both ways.
Open the browser in Kali and access the web administration dashboardin https://IP_T-POT:64294. Once you login withtsec,capture a screenshot of the overview.
Access by SSH is restricted to only exchanged keys. Hence, the nextstep is to copy your Kali’s public key into the file~/.ssh/authorized_keys(intsec’s home), which does notexist by default. To do it, you can use the “Terminal” option inthe administration dashboard or allow copying and pasting throughVMs in Virtual Box. Capture a screenshot of the command “cat~/.ssh/authorized_keys”.
In Kali, execute the command below (adapted to your settings) tocreate a tunnel, because the T-Pot dashboard is only listeninglocally.
ssh -p 64295 -l USER -N-L8080:127.0.0.1:64297 IP_T-POT
Then, access the dashboard from Kali with https://localhost:8080 andcapture a screenshot.
Note: the ssh tunnel might drop eventually, so just create it againif needed.
Check that the attack map is empty and capture a screenshot.
Perform a brute-force attack with nmap against the port 22, wherethe SSH honeypot is. You will need to use the scripting engine(NSE). What command did you use?
Note: there are wordlists you can use in/usr/share/wordlists/metasploit.
Check the SecurityMeter. Explain what information is shown.
If you intended to use T-Pot for research purposes capturinginformation about new trends, what your advice would be regardingwhere to install the machine, what IP address to use and whether afirewall should be placed before the honeypots?
My email: [email protected]
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here