Honeypot

Introduction

In this write-up, I will show you how to install and use a program called Pentbox on a Kali Linux device to create a basic honeypot system and test it using a standard web browser to detect an intrusion. 📝🖥️

🏢 Enterprise networks are usually large and complex. The more devices you add to them, the more complexity you add. With the enterprise network, ensuring the highest levels of security is critical. It would be best to update security controls regularly to ensure optimal security. 🔒

A honeypot is a decoy, or a trap, created by organizations to attract hackers into a computer system. 🍯 One of the main objectives of using a honeypot is to monitor the hacker’s exploit of the system’s vulnerabilities. Subsequently, learn the system’s weaknesses and apply the necessary security measures to strengthen it from future attacks. 💪🏾 Another objective is to study the hacker’s methodology. 🎯 The final objective is to divert the hacker’s attention from the main network to the decoy system.

⚠️ Disclaimer

All information, techniques, and tools described in this write-up are for educational purposes only. Use anything in this write-up at your discretion; I cannot be held responsible for any damages caused to any systems or yourselves legally. Using all tools and techniques described in this write-up for attacking individuals or organizations without their prior consent is highly illegal. You must obey all applicable local, state, and federal laws. I assume and accept no liability and will not be responsible for any misuse or damage caused by using the information herein.

🖥️ Lab Setup

    • VirtualBox
    • Kali Linux
    • Windows 10
    • Parrot OS
    • Pentbox Tool

Download and Install Pentbox on Kali Linux.

GitHub — technicaldada/pentbox: PentBox is a tool that allows us to create honeypot in our system this is written in ruby language.Pentbox is an application that can be configured as a honeypot. Penetration testers mainly use it as it has various tools available. Pentbox is written in Ruby language and installed on multiple operating systems, such as Windows, MacOS, and Linux.Use the following commands in the Kali Linux terminal:
git clone https://github.com/technicaldada/pentbox
cd pentbox
tar -zxvf pentbox.tar.gz
cd pentbox-1.8
./pentbox.rb

Set up a Honeypot with Pentbox.

Run the following command to start Pentbox in Kali Linux:
./pentbox.rb
Select the Network tools section from the Pentbox menu by typing:
2
On the next menu screen, type:
3
To select the Fast Auto Configuration option, on the run Pentbox screen, type:
1
You will get a notification that the HONEYPOT ACTIVATED ON PORT 80.

Test Honeypot Fast Auto Configuration Functionality with Windows.

IP Address of Windows 10 machine:
10.60.0.10
IP Address of Pentbox Honeypot host (Kali):
10.60.0.7.
Open Microsoft Edge on the Windows machine, click on the address bar, and type:
10.60.0.7
Press Enter.
An “Access denied” message appears on the web page.
The Kali terminal window displays INTRUSION ATTEMPT DETECTED from 10.60.0.10:50061.Note that the port numbers may vary.In a real scenario, the system administrator where the honeypot is deployed can take the appropriate measures to strengthen a computer system’s defenses.

Test Honeypot Manual Configuration Functionality with Parrot.

IP Address of Parrot machine:
10.60.0.22
Run Pentbox in Kali Linux:
./pentbox.rb
Select the network tools section:
2
On the next menu screen, type:
3
Then select the Manual Configuration option on the run Pentbox screen by typing:
2
Set up the manual configurations with the following commands:Port number:
23
Insert false message to show:
You are not allowed to remotely access my system, so get the hell out of here!
Save a log with intrusion?
y
Press Enter for Default: */pentbox/other/log_honeypot.txt.Activate beep sound?
n
You will be notified that the HONEYPOT ACTIVATED ON PORT 23, the Telnet service.
Open a new terminal in Parrot and run the telnet command followed by the Honeypot host IP address and the port number:
telnet 10.60.0.7 23
The Kali Linux terminal window displays INTRUSION ATTEMPT DETECTED from 10.60.0.22:59076.

Test Honeypot Manual Configuration False message to show Functionality.

Apply the following manual configuration settings.Port number:
80
Insert false message to show:
You are not allowed to access my system, so get the hell out of here now!
Save a log with intrusion?
y
Press Enter for Default: */pentbox/other/log_honeypot.txt.Activate beep sound?
n
You will be notified that the HONEYPOT ACTIVATED ON PORT 80.
On the Parrot machine, on the browser, click on the address bar and type:
10.60.0.7
The previously typed message appears on the web page as the access denied notice.

Conclusion

I appreciate you taking the time to read this article. Hopefully, the information presented has been helpful and valuable to you.

If you would like to access more articles, please follow me.

Also, don’t hesitate to leave feedback or suggestions for future topics. Thanks again for your interest and support!

error: Content is protected !!