Honeypot component by Technische Universität Berlin.
3.0.1
sudo docker pull jlnftk/honeypot:latest \ sudo docker run -p 2000-3000:22 --name iotac_honeypot -d -t jlnftk/honeypot:latest \ sudo docker ps \ sudo docker exec -it iotac_honeypot /bin/bash
su honeypot \ cd $HOME/honeypot/code/modules/ \ git pull \ set kafka_topic and systemID in config.json via:\ nano $HOME/honeypot/code/modules/config.json \ bash start_honeypot.sh
tail -f /home/honeypot/cowrie/var/log/cowrie/cowrie.log
docker exec -it honeypot_attacker /bin/sh
sudo docker inspect -f '{{.Name}} - {{range .NetworkSettings.Networks}}{{.IPAddress}}{{end}}' $(sudo docker ps -aq)
nmap -v 172.17.0.2 -p 1-5000
ssh root@172.17.0.3 -p 22 telnet 172.17.0.2 2223 ftp ...
gcc synflood.c -o synflood sudo ./synflood 172.17.0.2 22
ssh root@172.17.0.2 -p 22 execute commands
docker exec -it honeypot_container1 /bin/sh su honeypot cd $HOME/honeypot/code/modules/
bash start_honeypot.sh
docker exec -it honeypot_container2 /bin/sh su honeypot cd $HOME/honeypot/code/modules/
bash start_honeypot.sh
nmap -v 172.17.0.0/24 -p 22
curl -k https://172.17.0.2:5000/getall --header "apikey: iotacAPIkey1-s56JkyKbk4WrSBaXt9M99PC9XpGtUKZu9T"
su honeypot \ cd $HOME/honeypot/ \ git pull
thisisasecurepasswordforthehoneypotwithmanyletters