I exposed hackers (& bots) - (with an advanced honeypot).

Поделиться
HTML-код
  • Опубликовано: 4 окт 2024

Комментарии • 20

  • @xjalen4258
    @xjalen4258 Месяц назад +12

    I wish I was able to build projects like this

    • @harshi6340
      @harshi6340 Месяц назад +4

      Me too, maybe we can some day with consistent effort

    • @tracyrreed
      @tracyrreed Месяц назад +1

      Why can't you?

    • @collinsinfosec
      @collinsinfosec  Месяц назад +8

      I had no idea what I was doing the whole time 😀 It may appear overwhelming at first, but try to chunk your body of work into small, manageable sizes. You can do it 💪

  • @trueperson-o2z
    @trueperson-o2z Месяц назад +5

    I would really like to see the results in the dashboard after a few weeks of having the honeypot running!

    • @Gigi-zy1kx
      @Gigi-zy1kx Месяц назад +2

      I'm interested in that as well.

    • @collinsinfosec
      @collinsinfosec  Месяц назад +3

      You are welcomed to deploy this project yourself. Onto the crash course!

  • @kariolaras
    @kariolaras Месяц назад

    Nice one, just a small note that you can exit the ssh by pressing the tilde character and a dot `~.` (might require pressing enter prior to that) 😊

  • @toomanyhackers-e9z
    @toomanyhackers-e9z Месяц назад

    " I really have no idea what I am doing " quote... Legend!! That's how you got there, right? And you figured it out anyways. Thanks for the honey, sir. Just beautiful, very well done. Questian: After having trapped the attacker's shell you probably be able to execute a " reversed shell " aka RAT remote acces terminal since have all the credentials or do you need more to be able to reverse??

  • @johnczech7074
    @johnczech7074 Месяц назад +1

    Very interesting Grant! Thank you!

  • @Gigi-zy1kx
    @Gigi-zy1kx Месяц назад +1

    cool. look forward to the next video.

    • @collinsinfosec
      @collinsinfosec  Месяц назад

      Thanks, next video in this series will be the crash course.

    • @Gigi-zy1kx
      @Gigi-zy1kx Месяц назад

      @@collinsinfosec awesome

  • @BirdManBeats
    @BirdManBeats Месяц назад

    Awesome video as usual Grant, so helpful and interesting for someone like me (2nd year comp sci student)

  • @Segphalt
    @Segphalt Месяц назад +1

    Not sure I understand the tarpit. Certainly the logins are being done in an automated and threaded fashion likely doing little more than consuming a thread and momentarily causing a bit of annoyance if they are just testing logins to manually eval later.

    • @tracyrreed
      @tracyrreed Месяц назад

      It ties up all of the threads very quickly. If your system is tarpitting the attacker they aren't attacking someone else. Just one tarpit can totally stop the attacker.

    • @collinsinfosec
      @collinsinfosec  Месяц назад +1

      Even when the logins are being done in a threaded fashion, they will still be consumed by the tarpit, as the SSH connection relies on sending its banner first. So the threads will have to wait hours until honeypy has sent the full banner.

  • @sotecluxan4221
    @sotecluxan4221 Месяц назад

    !!!