مضى على الشبكة و يوم من العطاء.
  • تحذير: يجب على كل روّاد الشبكة تشغيل برامج الاختراق داخل الأنظمة الوهمية وهي بهدف التعلم وحماية الأعضاء والتوعية بها

Create a Honeypot on Kali Linux with Pentbox

sniper.exe

./عضو جديد

السمعة:

With the help of honeypot, you can easily monitor your operating system and monitor any hacker activity or you can say that it is the best way to hack the hacker himself.

Every large company already uses smart honeypots in its backend such as Google, Facebook and Microsoft.

In fact they want to track all the activities of all the users and if they find illegal or malicious activity then honeypot has the ability to immediately block the
dangerous IP address.


0*b6F0_X5AHhchn8ld

Types of Honeypots

Honeypots can be categorized in two ways, based on development and design criteria.

a) Basis of development
  • Production Honeypot
  • Research Honeypot
b) Basis of design criteria
  • Pure Honeypot
  • High-Interaction Honeypot
  • Low-Interaction Honeypot

How to set up a honeypot on Kali Linux

As you all know, Kali Linux is one of the most popular pentesting features with over 600+ built-in hacking / attacking tools pre-installed.

To install honeypot on a computer running Kali Linux, you need to download and install Pentbox, the which you can easily find through it Github repository.

Mandate: git clone https://github.com/whitehatpanda/pentbox-1.8.git


0*u6zB55WIIGQCXf8K

Once downloaded, you can simply run pentbox by typing ” ./pentbox.rb ”Inside the pentbox-1.8 folder.

0*AtEaWbuOUufL2bEo

As you can see, it will display 7–8 options, which you can easily perform as follows:
  1. Cryptography tools
  2. Network tools
  3. Web
  4. IP Grabber
  5. IP geographical location
  6. Mass attack
To use the Cryptography Tools, just enter “ 1 “And will display 4 other options such as” Base64 Encoder / Decoder “,” Multi-Digest “,” Hash Password Cracker “ and “ Secure Password Generator “.

You can use any of the options according to your needs.


0*I0zuHz1krF36sQsB

We now have Network Tools in option no. 2 through which you can perform ” Net Dos Tester “,” TCP port scanner “,” Honeypot “,” Fuzzer “,” DNS and Host gathering” and “ Mac address geolocation “.


To use the honeypot, just type “ 3 At your terminal.


0*YmOH1w7Pva7w6tYJ

Now you can see that there are two options through which you can configure your honeypot.

  • a) Fast automatic configuration
  • b) Manual configuration (for advanced users)
0*0Um_Z2xfa2sd9jij

You can set any of the options, but for novice users, the Quick Auto Configuration option is recommended. As you can see, the honeypot starts at the screenshot above.


Your honeypot will only monitor all activity on the PORT 80, but if you want to monitor some activity on another port, you can select the second Manual configuration option.

Port 80 means, when someone opens your IP / Host in their browser, then they will immediately record this request and display all possible information of this request as shown below:


0*NcqAvAbgW8cuKh48

The information you can see:

  • IP address
  • Details of its operating system
  • browser
  • various other information
Under the same network tools, there are also some interesting options such as “ Net Dos Tester Through which you can easily DOS someone with SYN and TCP flood attacks.

0*qc_A3tsr4sHbyp-f
 
الله يعطيك الف عافيه اخي وبارك الله فيك على طرح الموضوع
فضلاً وليس أمراً أن نكون سبباً في رفعة اللغة العربية واللي عنده القدرة يترجم الموضوع ويكون باللغتين بكون ممنونه.
تقبل مروري
 
من عيوني انشاء الله الشروحات القادمة بالعربي
الله يعطيك الف عافيه اخي وبارك الله فيك على طرح الموضوع
فضلاً وليس أمراً أن نكون سبباً في رفعة اللغة العربية واللي عنده القدرة يترجم الموضوع ويكون باللغتين بكون ممنونه.
تقبل مروري
 
  • Love
التفاعلات: STORM
من عيوني انشاء الله الشروحات القادمة بالعربي
يسعد قلبك وعيونك وربي يبارك فيك وبصحتك وبعلمك وعملك ويرزقك من اوسع الأبواب
 
With the help of honeypot, you can easily monitor your operating system and monitor any hacker activity or you can say that it is the best way to hack the hacker himself.

Every large company already uses smart honeypots in its backend such as Google, Facebook and Microsoft.

In fact they want to track all the activities of all the users and if they find illegal or malicious activity then honeypot has the ability to immediately block the dangerous IP address.


0*b6F0_X5AHhchn8ld

Types of Honeypots

Honeypots can be categorized in two ways, based on development and design criteria.

a) Basis of development

  • Production Honeypot
  • Research Honeypot
b) Basis of design criteria
  • Pure Honeypot
  • High-Interaction Honeypot
  • Low-Interaction Honeypot

How to set up a honeypot on Kali Linux

As you all know, Kali Linux is one of the most popular pentesting features with over 600+ built-in hacking / attacking tools pre-installed.

To install honeypot on a computer running Kali Linux, you need to download and install Pentbox, the which you can easily find through it Github repository.

Mandate: git clone https://github.com/whitehatpanda/pentbox-1.8.git


0*u6zB55WIIGQCXf8K

Once downloaded, you can simply run pentbox by typing ” ./pentbox.rb ”Inside the pentbox-1.8 folder.

0*AtEaWbuOUufL2bEo

As you can see, it will display 7–8 options, which you can easily perform as follows:

  1. Cryptography tools
  2. Network tools
  3. Web
  4. IP Grabber
  5. IP geographical location
  6. Mass attack
To use the Cryptography Tools, just enter “ 1 “And will display 4 other options such as” Base64 Encoder / Decoder “,” Multi-Digest “,” Hash Password Cracker “ and “ Secure Password Generator “.

You can use any of the options according to your needs.


0*I0zuHz1krF36sQsB

We now have Network Tools in option no. 2 through which you can perform ” Net Dos Tester “,” TCP port scanner “,” Honeypot “,” Fuzzer “,” DNS and Host gathering” and “ Mac address geolocation “.


To use the honeypot, just type “ 3 At your terminal.

0*YmOH1w7Pva7w6tYJ

Now you can see that there are two options through which you can configure your honeypot.

  • a) Fast automatic configuration
  • b) Manual configuration (for advanced users)
0*0Um_Z2xfa2sd9jij

You can set any of the options, but for novice users, the Quick Auto Configuration option is recommended. As you can see, the honeypot starts at the screenshot above.


Your honeypot will only monitor all activity on the PORT 80, but if you want to monitor some activity on another port, you can select the second Manual configuration option.

Port 80 means, when someone opens your IP / Host in their browser, then they will immediately record this request and display all possible information of this request as shown below:


0*NcqAvAbgW8cuKh48

The information you can see:

  • IP address
  • Details of its operating system
  • browser
  • various other information
Under the same network tools, there are also some interesting options such as “ Net Dos Tester Through which you can easily DOS someone with SYN and TCP flood attacks.

0*qc_A3tsr4sHbyp-f
الله يعطيك الف عافية يا استاذ، والله أبدعت💪
بننتظر جديدك استاذ🔥
بارك الله فيكم ونور عليكم جميع مع تحياتي للجميع🌹
 

آخر المشاركات

عودة
أعلى