Honeypot

DISCLAIMER

Any actions and or activities related to the material contained within this Website is solely your responsibility. The misuse of the information in this website can result in criminal charges brought against the persons in question. Cyber Security Associates Limited, will not be held responsible for any criminal charges brought against any individuals misusing the information in these projects to break the law.

Please ensure you are using the latest SD Card image which is available here.

 

Hardware Required

Component Number (Peli Case)

(Base) 4 + 5

(Base) 5

(Base) 9

(Level 1) 3

(Level 1) 3

(Level 1) 5

(Level 1) 1

Component Number (Box Case)

Slot 1

Slot 11

Slot 2

Slot 11

Slot 11

Slot 12

Slot 13

Component

Raspberry Pi + Case

Kali Linux SD Card

TFT Screen

HDMI

Wireless Keyboard

Wireless Mouse

Power Supply Unit

 

Video Guide

Conclusion

This project is designed to introduce you to the concept of a honeypot and its applications within IT and cyber security. You will have used software on the Raspberry Pi to configure it into a honeypot then have run it to have exposed ports. Once a connection is attempted it will then log the IP address and prevent access to a legitimate service. A honeypot is an extremely powerful tool, and this project is just the beginning on what you can do achieve with it. Keep in mind that the Raspberry is limited in processing power and will not be able to handle large volumes of traffic accurately. As such, this should obviously not be used in production environments.