Это видео недоступно.
Сожалеем об этом.

Catching Hackers & Bots with an SSH Honeypot | 30 Day Experiment

Поделиться
HTML-код
  • Опубликовано: 4 авг 2024
  • Note: This video is for educational purposes only. I do not condone nor promote illegal activity.
    I ran an open-source SSH honeypot to catch bots and hacking login attempts to collect usernames, passwords, and geographical information. Thank you to Linode for making this experiment possible. Sign up to get a $100 free credit (or 60 day trial): www.linode.com/gcollins
    🔒 Interested in cybersecurity? Take a look at this quiz to find out if cybersecurity is right for you: www.cybercademy.org/quiz/​​
    🔗 Resource Links mentioned:
    PSHITT Honeypot GitHub: github.com/regit/pshitt
    Lessons Learned from SSH Credential Honeypots: systemoverlord.com/2020/09/04...
    ⏰ Timestamps:
    0:00 - Introduction
    1:10 - Setting up the Honeypot
    3:17 - Stopping the Honeypot
    4:37 - Results and Statistics
    ❓ Interested in cybersecurity, but don't know where to start? Take a look at this newly released course which helps you get started in cybersecurity: www.cybercademy.org/course​​
    🐕 Follow Me:
    Twitter: / collinsinfosec​​
    Instagram: / collinsinfo...​
    Cybercademy Discord Server: / discord
    🤔 Have questions, concerns, comments?:
    Email me: grant@cybercademy.org
    🎧 Gear:
    Laptop (Lenovo X1 Carbon Ultrabook 6th Gen): amzn.to/2O0UfAM​​
    Monitors (Dell D Series 31.5” D3218HN): amzn.to/2EXlgRF​​
    Keyboard (Velocifire VM01): amzn.to/2TEswfd​​
    Headphones (Audio Technica ATH-M40x): amzn.to/2F4Tvq6​​
    Standing Desk (FlexiSpot Height Adjustable 47 inch): amzn.to/3p3uSAa

Комментарии • 45

  • @ThaLiquidEdit
    @ThaLiquidEdit 3 года назад +29

    More experiments please! Very interesting video!

  • @user-hw8qh2ct2v
    @user-hw8qh2ct2v 3 года назад +4

    Gotta love the content!

  • @kazami6317
    @kazami6317 3 года назад +12

    Time to add dee boo dah to the jack the ripper lol. Good vid! Never thought that attackers would target small "random" servers that much. I wonder how much traffic big corporations get.

  • @johnczech7074
    @johnczech7074 3 года назад +3

    Hey Grant! It's great to see you buddy. Hope you're well and thank you for the excellent content!

  • @williamguru
    @williamguru 3 года назад +1

    Great video. Good reason to set your server to block log in from the internet and to only use key pairs.

  • @Leadar102
    @Leadar102 Год назад +1

    smooth explanation , u got me at the end haha xD

  • @keaganrobinson8251
    @keaganrobinson8251 3 года назад +1

    I admire your work ethic

  • @moneganyuocheap
    @moneganyuocheap 3 года назад

    Need you to post videos more often like a day in the life

  • @CuchulainZA
    @CuchulainZA 3 года назад +7

    Interesting experiment. I did something similar from 16 January to 17 March. With Honeypots hosted in various countries via linode and personal servers at a few universities across the world. Its interesting to see what passwords you got in your top 10. I observed different results based on geographical location and whether the nodes were publicly hosted or hosted on university networks with a public IP

    • @collinsinfosec
      @collinsinfosec  3 года назад +4

      Very interesting experiment. Thank you for sharing your results!

    • @CuchulainZA
      @CuchulainZA 3 года назад +4

      @@collinsinfosec some of those weird passwords you see might be related to botnets. If you look at the TTY logs you will see the automated scripts try to change root passwords to some weird new passwords for future exploration.

  • @nicholasl.4330
    @nicholasl.4330 3 года назад +7

    The random password could be something translated, like how some standard passwords are translated from other languages. Because those requests probably came from China, and obviously have a different language system, they might have translated the characters to that password

  • @guilherme5094
    @guilherme5094 3 года назад

    Great experiment!

  • @vladislavkaras491
    @vladislavkaras491 6 месяцев назад

    Cool idea!
    Thanks for the video!

  • @peterc1019
    @peterc1019 Год назад +1

    This is great. I'd love to see a honeypot where you let them in and see what they do.

  • @linuxinside6188
    @linuxinside6188 3 года назад

    Awesome work

  • @fbifido2
    @fbifido2 2 года назад +4

    can you do a video how you install & setup your honeypot ???

  • @virtualizeeverything
    @virtualizeeverything 3 года назад

    grate project

  • @mustafeasad9377
    @mustafeasad9377 3 года назад

    Please can u tell me what is the difference between ethical hacking and cybersecurity ?

  • @serhadaras4461
    @serhadaras4461 2 года назад

    can i have the ssh listening script?

  • @alexmarchant4277
    @alexmarchant4277 2 года назад

    what about loging all failed user names and passwords on a ssh port? knowing what passwords are being tryed. I can ban network user from using them.

    • @collinsinfosec
      @collinsinfosec  2 года назад +1

      Good insight - will keep this in mind for the future.

    • @edwardmacnab354
      @edwardmacnab354 2 года назад +1

      there is a dictionary of such passwords and it is a big dictionary

  • @lucabianchi6567
    @lucabianchi6567 3 года назад

    So, what is the reason of that "strange" password? The second one I mean

  • @adipurnomo5683
    @adipurnomo5683 3 года назад +2

    Bro, is it linode like virtualbox?

    • @collinsinfosec
      @collinsinfosec  3 года назад +3

      It is like VirtualBox - sort of. Except the machine is hosted out on another computer instead of your own.

    • @adipurnomo5683
      @adipurnomo5683 3 года назад

      @@collinsinfosec thanks bro

  • @sembutininverse
    @sembutininverse 3 года назад +1

    👌🏻

  • @tomofedek7613
    @tomofedek7613 2 года назад

    they can scan server and see that you have open 5323 :)

  • @DeveroonieWasTaken
    @DeveroonieWasTaken 2 года назад

    The 7 dislikes are the hackers who got busted

  • @HarryWizard
    @HarryWizard 3 года назад +4

    this was recorded the day after the US capitol insurrection? feels like that was years ago lmao

  • @ericouhl5423
    @ericouhl5423 2 года назад

    De Boo Da

  • @nostromza3433
    @nostromza3433 Год назад +2

    How to catch a script kiddie 101

  • @doctorordi967
    @doctorordi967 3 года назад +1

    First comment 😁

  • @bigsam4550
    @bigsam4550 3 года назад +2

    Gracias coder_will en Instagram por tu buen trabajo, el impostor ha sido descubierto, ahora está en la cárcel mientras te escribo

  • @bigsam4550
    @bigsam4550 3 года назад +1

    Recomiendo coder_will en Instagram para piratear servicios en los que no ha fallado, independientemente de cuántas veces haya usado sus servicios. En términos de recuperación de cuentas y servicio de espionaje.

  • @onurhanyalcn6524
    @onurhanyalcn6524 3 месяца назад

    a video how can describles worse

  • @tombaumann5064
    @tombaumann5064 3 года назад +2

    I could imagine that random password is from crawlers such as shodan.io - using a random password on purpose to not accidentally break into someone’s server/device that hasn’t been secured properly - I reckon depending on where the devices are located, this could have some legal difficulties for the companies running such crawlers.
    Nice video btw :thumbs_up: