A Python-based honeypot project designed to simulate a vulnerable system, log attacker activities, and gather intelligence about their techniques and intentions.
Please note that running a honeypot can expose your system to potential risks. It is essential to implement proper security measures and monitoring when using a honeypot.
- Simulates a Kali Linux environment with a fake command prompt
- Logs usernames, passwords, and commands used by attackers
- Handles multiple connections simultaneously using threads
- Can be customized to change the simulated environment, login credentials, or response messages
- Clone this repository:
git clone https://github.com/abdulsamieofficial/Honeypots.git
- Change to the project directory:
cd honeypot-project
- Install the required dependencies:
pip install -r requirements.txt
- Open honeypot.py with a text editor and adjust the host variable to your system's IP address.
- Run the script:
python3 honeypot.py
- Monitor the log.txt file for logged activities from attackers.
- Change the predefined username and password used for authentication by modifying the values in the threaded_client(c) function.
- Add or modify commands and responses by editing the cmdTerm(user_cmd,c,user_dict) and commandLS(inp_cmd) functions.
- Customize the appearance of the command prompt by adjusting the sendCmds(inp_cmd,c) function.
- Fork the repository on GitHub.
- Clone your fork and create a new branch for your feature or bugfix.
- Commit your changes to your branch.
- Push your changes to your fork on GitHub.
- Submit a pull request to the original repository.
This project is licensed under the MIT License. See LICENSE for more information.
The author is not responsible for any misuse of this project. The honeypot is intended for educational and research purposes only. By using this project, you agree to take full responsibility for any consequences resulting from its usage.