Honeypot!!! Trap For Hackers
So Friends, Today You will learn about Honeypot. It’s a very important post for all the hackers. So, I recommend you to read this full post.
It’s an application which attracts a Hacker to hack itself. So, that it can trace that hacker. It pretends to a hacker that it’s very vulnerable. When Hacker try to hack the system then all the activities of the Hacker is traced by Honeypot. This is set up to distract the hacker. During this process, all the process of a hacker is retrieved.
For ex:- If a person wants to catch an animal then he/she will make a trap for that animal. Similarly, Honeypot is working like a trap for the malicious hacker.
ALSO READ:- What is Google Dorks? Interesting Google Dorks
It is clear from its name that it is a pot full of Honey. Whenever a fly bee comes to sucks honey from the pot then we will catch it. Similarly, The Pot full of honey is a server and a Fly Bee is a Hacker.
If a company open some ports on its server and hacker regularly try the hacking attacks on that port. In that case, Company will setup Honeypots to all these ports to trace hackers.
Honeypots are divides into two parts:-
- Production Honeypots
- Research Honeypots
Production Honeypots:- It’s a low interaction honeypot by which we can collect limited information about the hacker. It’s very easy to use. Production Honeypots are placed into the production network to improve their state of security.
Research Honeypots:- This is an advance honeypot which is set up to retrieve the information/motive of the Black Hat Hacker. It is mainly used by the Govt. Organization.
Research Honeypot is also divided into 3 parts:-
- Pure Honeypots
- High-Interaction Honeypots
- Low-Interaction Honeypots
How To Create a Honeypot?
Here, I’m using a tool to setup Honeypot which is PentBox. You can download this tool by Clicking Here. and you can also download this tool by typing ⏬ in your Kali Linux Terminal.
git clone https://github.com/whitehatpanda/pentbox-1.8.git
Now, You need to run pentbox.rb script. Type ⏬ in your terminal.
If you wanted to setup Honeypot in your Network then just type
Now, we have to setup Honeypot here. So, I type here
Here, two options are visible
- Fast Auto Configuration:- There is no need to configure this option.
- Manual Configuration:- You have to configure this manually.
Fast Auto Configuration
Firstly, We use here first option. So, type
and Hit Enter. Now the Honeypot is activated on Port No. 80.
To check this is working or not. Just Go to your Windows Machine which is on the same network and then types your Kali Linux IP address on the browser. If this is shown an error like given below then it is working and your all details are monitored in your Kali Linux Terminal.
You can also see here your all details like
- Operating System
are retrieved by the Honeypot.
Again open your Pentbox and do the same procedure till Honeypot option. Above, we type 1 for auto configuration. But now, type 2 for Manual Configuration.
This option will ask you some questions. You have to answer them.
- You have to type port no. on which you want to set up Honeypot.
- then it asks for a message which is shown to the attacker when he/she will try any attack on this port.
- Now, It will ask, You want to save logs of the attack or not.
- At last, It will ask you If you want to make a beep sound when someone tries to attack this port.
Now, the Honeypot is activated on the Port No.23
To check this Honeypot. Open your Command Prompt and type
telnet ‘Kali IP’
Here, you can see your Alert message which you gave above. Now, go to your Kali and see all the details will be shown there.
DON’T FORGET:- How to Create a Phishing Page & Phishing attack Step by Step