JTCyberTech / Cybersecurity-Home-Labs

5 stars 1 forks source link

Azure T-POT HoneyPot - READ ME #38

Open JTCyberTech opened 1 year ago

JTCyberTech commented 1 year ago

Prerequisites

In this project, I have successfully implemented T-POT on the Azure Cloud infrastructure. T-POT, a sophisticated honeypot, emulates 23 distinct vulnerable systems. This project has helped me gain valuable insights into Linux configuration and network settings within a cloud environment, augmenting my technical proficiency. Furthermore, it has enriched my skill set in threat detection, acquired through vigilant monitoring and in-depth analysis of honeypot-generated data. This hands-on experience provided me with firsthand exposure to the methodologies employed by threat actors as they seek to exploit various vulnerabilities and compromise system security.

Creating an Azure Account

Downloading PuTTY

CMD System Type

- Click the version under MSI (Windows Installer)



Here are the steps I will be taking to complete this project: 1. Create VM in Azure for Honeypot 2. Installation and Configuration of Honeypot in Azure 3. Honeypot Web Interface 4. Discover Threats with HoneyPot in Real-Time

Conclusion

During a 10-hour monitoring period of my Honeypot VM, it recorded an excess of 10,000 attempted attacks.