DEV Community

Cover image for What is a honeypot and why might it be important?
Hunt Navar
Hunt Navar

Posted on

3 2

What is a honeypot and why might it be important?

If you have never worked or had an interest in cyber security, then the term "honeypot" might have a foreign meaning to you. As the name implies a honeypot lures hackers in with its sweet false hopes, hackers then unknowingly go after information not knowing they have enter a trap.

On the internet a honeypot might look like a badly built login page or some type of low hanging fruit that a hacker believes they can access and gather sensitive information from.

Image description

There are two places a honeypot usually is set when monitoring and discovering hackers. In enterprises firewalls are set to filter out a majority of hackers. Knowing this, our first inclination might to put our honeypot after the firewall. While this is certainly not the wrong assumption to have, the amount of knowledge gained by observing malignant actors actions drastically decreases.

The reasons to want the honeypot within your firewall would be regarding internal bad actors; while few, they would not be monitored or even discovered.
Image description

One of the best all encompassing honeypots is called Tpot and can be examined here.https://github.com/telekom-security/tpotce

I would not download this on a personal computer as it takes a large amount of storage space; however, if you are working for an enterprise or have the storage space available, feel free to download for these cool features.

I AM NOT RESPONSIBLE FOR CHANGES MADE TO YOUR COMPUTER

Anyway, installation is very simple. Run these commands using Unbuntu 18.04 or higher. You will also need an Unbuntu server.

Image description
Also, if git isn't insatlled make sure to run

sudo yum install git

Let the installation continue until you are automatically signed into the Kabana dashboard.

You will have access to all the different honeypots Tpot has to offer! There is a tremendous amount of information accessible to you at this point so go through you dashboard and find your favorites!
Image description

Let your program run and see all the hackers come out for the honey! You can identify the passwords and usernames attempted which will allow you to protect yourself better.
Image description

Thanks for sticking along and reading; I hope you learned something unique!

Source: https://blog.24by7security.com/honeypots-and-how-they-can-secure-your-network?https://www.24by7security.com/cmmc&gclid=Cj0KCQjwiNSLBhCPARIsAKNS4_d9Fz14_8S8OcNl5Q69xNrsaOIFWZE5zD16fbDcbtTQ1oN8rkCS4zUaAqtoEALw_wcB
Source: https://usa.kaspersky.com/resource-center/threats/what-is-a-honeypot
Source: https://cyber-99.co.uk/t-pot-honeypot-framework-installation
Source:https://www.youtube.com/watch?v=0WUaI2pNiPI&t=494s

Hostinger image

Get n8n VPS hosting 3x cheaper than a cloud solution

Get fast, easy, secure n8n VPS hosting from $4.99/mo at Hostinger. Automate any workflow using a pre-installed n8n application and no-code customization.

Start now

Top comments (0)

Billboard image

The Next Generation Developer Platform

Coherence is the first Platform-as-a-Service you can control. Unlike "black-box" platforms that are opinionated about the infra you can deploy, Coherence is powered by CNC, the open-source IaC framework, which offers limitless customization.

Learn more

👋 Kindness is contagious

Please leave a ❤️ or a friendly comment on this post if you found it helpful!

Okay