Questions tagged [honeypot]
a system designed to lure attackers towards it in order to learn about new attacks or to draw attention away from the real system
136 questions
0 votes
0 answers
100 views
Are connecting to honeypots through RDP a risk for the connecting computer?
Because the vps where I have installed the t-pot doesn't have any graphic cards (GPU), I must connect to the honeypot through RDP. I connect to the t-pot honeypot directly from my main computer. Are ...
1 vote
0 answers
61 views
commands to setup Ubuntu firewall rules from the terminal for T-Pot
Considering T-Pot System Placement Which are the commands to configure Ubuntu firewall from the terminal, in order for the T-pot to work properly.
0 votes
2 answers
304 views
Hosting a Honeypot to collect data [closed]
I want to collect IoT botnets in order to analyze them. Are there any good VPS providers who allow to do that? - I'm a little cautious about this because of possible misconfigurations that could ...
0 votes
1 answer
169 views
Attract Traffic on my Honeypot [duplicate]
I have deployed a low-interaction honeypot on my ec2 aws instance but I am not receiving any traffic. Where can I share the URL so that I can get more traffic especially from automated bots.
0 votes
0 answers
135 views
Low interactive honeypot - how many fake services should i use
I would like to ask for some tips and your own experience. I want to try build some low-interactive honeypot, but I don't know how many services should I run on it or what is suitable to have on this ...
1 vote
0 answers
34 views
Receive more spam emails [duplicate]
Out of curiosity I want my email address to receive as much spam as possible. For this, I have already set up a virtual machine, with a Postfix that has a catch-all user, so I receive every email to ...
0 votes
0 answers
171 views
How to write separate log files for separate services in dionaea honeypot
I am trying to set up a honeypot service on the network and I installed dionaea honeypot. I figured out that each service is being controlled by yaml files present in /opt/dionaea/etc/dionaea/services-...
0 votes
1 answer
219 views
Honeyd not responding to TCP
I'm having some issues getting Honeyd to work properly on an external network interface on Ubuntu 20 LTS running on a Proxmox server. I'm fairly sure it's a configuration/setup problem on the VM I'm ...
0 votes
0 answers
182 views
Malware sinkhole evasion techniques
I have read into malware sink holing, as a way to disrupt botnets. There are also approaches to make this more difficult, for example using a Domain Name Generator algorithm which is what the ...
1 vote
1 answer
234 views
How would you counter an email/honeypot mischief scenario?
I'm thinking through a mischief denial-of-service scenario that seems too easy to employ. Your web-site validates email addresses for new users on sign-up. A rogue party (a competitor) performs sign-...
27 votes
6 answers
8k views
How can I get more spam for my honeypot?
Spam is everywhere and everyone gets it (especially professors), but I noticed that my personal email does not get much spam. How can I get more? What are the most common ways of getting spam? Not ...
1 vote
2 answers
650 views
How is DNS sinkhole being use?
I had some difficulty in grasping the concept on how "DNS sinkhole" is being utilize. Is it like setting up something similar to a honeypot to lure attackers away from the actual network, so ...
0 votes
0 answers
209 views
How to Minimize Risk of Remote Access from Potential Job Scam?
Question resolved: no reason at this time to assume the remote access was with any malicious intent. [skip this beginning if you want] My partner was offered a job with a real estate listing company ...
0 votes
0 answers
122 views
Detect KPsensor HoneyPot
Is there any pattern or characteristics to identify a kpsensor? It is one of the most used. I have noticed that of the number of supposedly open ports, only those with a real service running respond ...
1 vote
1 answer
533 views
Is it possible to create a honeytoken as an image file?
I though it would be an interesting idea for my final year project. A honeypot token in an image form, with a hidden script that will send you information about the user when the file is executed (...