How to install Honeypot trap on Kali Linux to detect intrusion

- Advertisment -
- Advertisement -

If you are a new student of White Hat hacking or Ethical Hacking course then you must have heard the term of Honeypot, which is used to lure the potential cyber attackers into a trap. Also, all the White hackers and Ethical hacking experts use the Kali Linux OS as their main OS cum tool to deal with cyber-attacks and to commit any White hat cyber-attack.

Who needs to set Cyber Honeypot? Learn to Setup Honeypot

Now whether you are a student of Ethical hacking or a professional white-hat hacker, you must learn how to setup Honeypots to lure away the potential attacker to protect your targeted system or website or server. Also, if you have just started hacking or cybersecurity learning this trick will clear the Honeypot on Kali Linux concept while increasing knowledge.

Facts about Honeypots

  • Most of the cyber-security experts do depend on the Honeypot setup, as the first protection against the hackers.
  • The use and the mechanism of Honeypot is quite simple, as these setups are put in place to mimic any targeted or particular website, system or data archives for the cyber-attackers. With putting the honeypot in place, admins not only can detect and log attacks to certain services also can register the originating IP address of related attack, hence protecting the system and detecting the criminal both are done at the same place.
  • You may think off all the Hacking related techniques involve a lot of coding and demands huge expertise over the topic, while setting up a Honeypot is very simple and if you have already installed Kali Linux on your PC then it is just matter of minutes.

In this article I am going to show you how using the combination of Kali Linux and Pentbox, anyone can have a Honeypot set up, ready to go in minutes.

Honeypot Perquisites

  • A PC where Kali Linux is installed and you will need the admin rights in that PC as well.
  • Also, you will be needing an application called Pentbox which you have to download and install through the command-line interface, to use admin-level privileges.

How to download and start Pentbox

  • Type the below in the terminal command-line interface.
    wget http://downloads.sourceforge.net/project/pentbox18realised/pentbox-1.8.tar.gz
  • Once the file download is finished, extract the files from the downloaded archive, which is
     tar xvfz pentbox-1.8.tar.gz
  • By doing the above step you will have a new directory (folder) named pentbox-1.8. Now go to that directory from by using the terminal command
    cd pentbox-1.8

How to run Pentbox

Now run Pentbox Ruby script with this command ./pentbox.rb

Note: If you don’t have ruby then install that first before running the Pentbox script:

 sudo apt install ruby

Activate the HoneyPot on your Kali Linux

After issuing the command, the user would be greeted by a menu on the terminal window. From that menu, you have to select 2 (for Networking tools) and then select 3 for Honeypot, according to the figure below.

Run pentbox on Kali Linux-min

Select Honeypot to create on Kali Linux-min

Now you have the next menu, here select 1 (for Fast Auto Configuration) and the honeypot listening on port 80 is launched. Like the image below:

Activate honeypot on port 80-min

 

Test Honeypot is working or not

Now you have to open a web browser on another PC (2nd PC or virtual machine must be connected to the same network as the Honeypot you are setting up) and you have to point it towards http://SERVER_IP (where SERVER_IP is the IP address of Honeypot Kali machine). You will be stopped by an “Access Denied” message on the webpage.

Access denied on checking honeypot working-min

Now you have to go back to the Kali Linux terminal window of the Honeypot PC and you would be able to see that the Honeypot picked up the requested connection from the 2nd Consider the below pic.

intrusion recorded on Kali Linux Honeypot-min

Honeypot for some specific port number

Now to launch any specific instance, we have to launch a Honeypot in manual mode. Let us assume you are facing trouble with cyber-attacks on SSH. Then you have to deploy Pentbox such that it’s would listen to port 22. Thus, to tackle this, stop the running honeypot using ctirl+c and again run the Pentbox script and then again Network Tools->Honeypot and this time instead of selecting Fast Auto configuration mode go for  Manual COnfiguration [Advanced Users, more options].

  1. Insert Port to Open: 22 (You can choose any other port as well)
  2. Insert false message to show: (Whatever you want) Here we are giving “Test SSh port”
  3. Save a log with intrusions: Y
  4. Log filename: Press the Enter button to leave it as default.Manual configuration of Honeypot for SSH port-min
  5. Activate beep sound when intrusion: Now you can also set up a beep announces for any attempt of intrusion. When the Honeypot is up and running, any attempted breach to SSH into the Kali Linux machine from your 2nd pc or any other pc on the network, you will have the beep and also the log of the attempted actions.Make default log file and activate Kali Linux pot-min

Try to access SSH port of Kali Linux from any other computer, you will get a beep, message of intrusion of command screen as well as details in the log file.

Honeypot for some specific port number-min

In the above pic, you can see, Pentbox is giving the alert message as well as detecting the originating IP address. Though the attacker may have used some IP address bouncer or masked IP address, the system on Pentbox does its job by reporting the initiator IP address only. In case of a masked IP user, you may have to take other means to detect the attacker. Congratulation, on the deployment of your fist honeypot, you are now one step closer to become a White hat cybersecurity expert.

 

Sayan Deyhttps://www.how2shout.com/
He has experience of working in the Telecom industry for more than two years as a Radio Frequency Engineer in different top companies. Plus depth technical knowledge of Electronics Appliances & Gadgets. When he is not working then he is a Hardcore Gamer, Novel Reader, and Football Player.

LEAVE A REPLY

Please enter your comment!
Please enter your name here

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Latest Posts

Experts Guide On- How to play Sniper in DOTA 2 like a Pro

Gameplay Kardel Sharpeye or Sniper is a very long-ranged carry type character in DOTA 2. Sniper is designed is a...

What are bottlenecks? Some ways to get rid of PC bottlenecks

It is quite normal to get frustrated when we invest in something but don’t get the expected output in...

How to see different time zones on your Windows 10 and Android

One of the most fundamental thing in this universe is time. Even in our daily lives, we...

AVerMedia launches EA713-AAMN PC box with NVIDIA Jetson AGX

AVerMedia which has been providing NVIDIA Jetson solutions since 2018 recently announced a new product to boost the various...
- Advertisement -

Secureye introduces Falcon iCam 500 Night Vision Camera for homes

Security and surveillance product and solution provider- Secureye, recently has announced its new product in India to secure homes....

Array Networks announces its first ‘Make in India’ product- Amplifier

News Highlights: Amplifier, the first product to be designed and developed in India, tests the load capacity for advanced...

- Advertisment -
- Advertisement -

You might also likeRELATED
Recommended to you