This repository contains the following folders:
command data
- fake data that the honeypot should send to its clients when prompteddecompiled
- decompiled malwareimages
- notable images (more relevant during the development process)imports
- Anything the scripts need to function properlylogs
- data collected by the honeypotmalware col
- contains the executables attempted by attackersscrips
- scripts for running the server automatically on bootup and attaching an additional VNIC to the instance
The virtual machine that the honeypot in this project is run on is rented from the Oracle Cloud Infrastructure. Once an account has been created, the user can rent up to two AMD Compute VMs for free. The steps for setting up these VMs are listed below:
- Navigate to
Instances
and create an instance with the desired OS, memory size and processor. - This involves creating a subnet, VCN and VNIC. Additionally, creating a network security group with ingress and engress rules for the instance is advised here.
- Log into the instance via SSH.
- If more than one IP address for the honeypot is desired, this means that an additional VNIC has to be created and attached to the instance. This step is best explained by this video.
- The script in question can be found in the scripts folder. This concludes setting up an Oracle Cloud instance.
- Start server on OCI launch:
crontab -e
->@reboot /home/ubuntu/Masters/run_vehicle_server.sh
- Open for telnet traffic on the honeypot (in case there are firewall problems)
-A INPUT -p tcp -m state --state NEW -m tcp --dport 23 -j ACCEPT
in/etc/iptables/rules.v4