0% found this document useful (0 votes)
43 views3 pages

Honeypot

The Qeeqbox Honeypots GitHub repository provides lightweight honeypots to simulate vulnerable services for detecting and logging attacks. Users can clone the repository, install dependencies, configure, and run specific honeypots, while also testing their functionality and analyzing logs. It is recommended to deploy honeypots on isolated networks with proper monitoring and safety precautions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
43 views3 pages

Honeypot

The Qeeqbox Honeypots GitHub repository provides lightweight honeypots to simulate vulnerable services for detecting and logging attacks. Users can clone the repository, install dependencies, configure, and run specific honeypots, while also testing their functionality and analyzing logs. It is recommended to deploy honeypots on isolated networks with proper monitoring and safety precautions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

https://github.

com/qeeqbox/honeypots/tree/main how i use this or implement this or test demo

ChatGPT said:

The Qeeqbox Honeypots repository on GitHub contains a collection of lightweight honeypots that
can simulate vulnerable services to detect and log potential attacks. Here’s how you can get started
with it:

1. Clone the Repository

First, clone the repository to your local system:

bash

CopyEdit

git clone https://github.com/qeeqbox/honeypots.git

cd honeypots

2. Explore Available Honeypots

The repository contains multiple honeypots, each simulating different services (like SSH, FTP, HTTP,
etc.). You can find them organized in directories.

To list all available honeypots:

bash

CopyEdit

ls -l

3. Install Dependencies

Most honeypots are Python-based, so ensure you have Python installed:

bash

CopyEdit

python3 --version

pip3 install -r requirements.txt

Each honeypot may have its own requirements file. Check inside the specific honeypot folder.

4. Configuration

Before running a honeypot, review its configuration. Configuration files are usually JSON or YAML
files. Customize ports and logging paths as needed.

For example:

bash

CopyEdit
nano ssh-honeypot/config.json

5. Running a Honeypot

Run a specific honeypot using Python:

bash

CopyEdit

python3 ssh-honeypot/ssh-honeypot.py

If the honeypot supports Docker, you can also use Docker to run it:

bash

CopyEdit

docker build -t ssh-honeypot ./ssh-honeypot

docker run -d -p 22:22 ssh-honeypot

6. Testing the Honeypot

To test whether the honeypot is working, try connecting to it from another machine:

bash

CopyEdit

ssh root@localhost

The honeypot should log your attempt, capturing IP, username, and password.

7. Analyzing Logs

Logs are usually stored in the same folder as the honeypot or in a logs/ directory:

bash

CopyEdit

cat ssh-honeypot/logs/ssh.log

8. Deploying on a Server

If you’re setting up the honeypot on a server:

 Use port forwarding if running on non-standard ports.

 Set up a firewall to control access.

 Monitor logs regularly.

9. Monitoring and Alerts


You can set up alerts using tools like Logstash, Graylog, or simple email notifications whenever
suspicious activity is logged.

10. Safety Precautions

 Run honeypots on isolated networks to avoid compromising production environments.

 Never expose actual services on the same machine as your honeypot.

Link
honeypots/honeypots at main ·
qeeqbox/honeypots

You might also like