Skip to content

ryanbynoe/honeypot_T-Pot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 

Repository files navigation

T-Pot Honey Platform

T-Pot Logo

Attack Live

Overview

Deployment of T-Pot Honeypot in AWS

Tools Used

  • AWS: Used an EC2 instance to host the honeypot.
  • VirtualBox: Kali Linux virtual machine to SSH into the host.
  • T-Pot platform: all in one honeypot platform

Deployment Steps

EC2 Instance

  • AMI: Debian 11
  • Instance type: t3.large cost: 0.0832 USD/hr
  • Storage: 128 GB

Inbound rules

  • Ports 64294, 64295, 64297 will be sourced to MyIP. This allows access to the T-pot management platform after install.

  • Ports 1-64000 lures the attackers in

Inbound Rules

Connect to Instance via Virtual machine

SSH into instance using private key. ssh -i [private key path] admin@[instance public ip] SSH

T-Pot Install

Git install

sudo apt update -y

sudo apt install git -y

T-Pot Install

    git clone https://github.com/telekom-security/tpotce
    cd tpotce/iso/installer/
    sudo ./install.sh --type=user

Kibana Dashboard

Kibana

  • Top attack was Dionaea
  • Panama had the most attacks by a country.
  • CVE -2020-11899

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors