Setup Modern Honeypot Network on Ubuntu | mhn Honeypot

Published: 08 April 2023
on channel: linux-syr
4,042
39

Setup Modern Honey Network on Ubuntu | mhn Honeypot
to setup honeypot you need 2 system. on mhn server run this commands:
cd /opt/
sudo git clone https://github.com/pwnlandia/mhn.git
cd mhn/
sudo ./install.sh
on sensor sys deploy the scripts.
MHN (Modern Honey Network) is an open source framework for deploying and managing honeypots. It is designed to simplify the deployment of honeypots and provide a centralized management interface for collecting and analyzing data from multiple honeypots.

MHN offers a number of benefits for organizations looking to improve their security posture:

Detection: honeypots can detect attacks that would otherwise go unnoticed. By simulating vulnerable systems or services, honeypots can attract attackers and provide early warning of potential threats.

Analysis: Honeypots provide valuable data about attackers' tactics, techniques and procedures (TTPs). This information can be used to improve security defenses and develop better threat intelligence.

Mitigation: Honeypots can be used to deflect attacks from critical systems. By luring attackers into a controlled environment, honeypots can reduce the risk of damage to production systems.

Training: Honeypots can be used to educate security professionals about the latest threats and attack techniques. By analyzing honeypot data, security teams can gain insight into attacker behavior and develop better defenses.

However, there are certain risks and potential dangers associated with honeypots that organizations should be aware of when deploying honeypots:
False sense of security: Honeypots can give organizations a false sense of security if they rely on them too heavily. Honeypots are not a substitute for traditional security measures such as firewalls, intrusion detection systems and antivirus software.
Misconfiguration: Honeypots can be misconfigured or poorly implemented, which can make them vulnerable to attack. For example, if a honeypot is not properly isolated from the rest of the network, attackers can use it as a launching point for attacks on other systems.
They attract unwanted attention: Honeypots can attract unwanted attention from attackers and increase the risk of a real attack. Attackers may become suspicious if they encounter a system that appears to be vulnerable but does not behave like a typical system.
Legal and ethical issues: honeypots can raise legal and ethical issues if they capture sensitive information or violate people's privacy. Organizations should ensure they have legal and ethical policies in place before deploying honeypots.
what mhn honeypot offer:
Honeypots:
Dionaea: a low-interaction honeypot that emulates vulnerable services such as SMB, HTTP, FTP, and others.
Cowrie: a high-interaction SSH and Telnet honeypot that emulates a Unix-like system and captures session data.
Snort: a network intrusion detection system that can be configured as a honeypot to capture and analyze network traffic.
Honeyd: a virtual honeypot that can simulate multiple operating systems and services.

Scripts:
Kippo-Graph: a visualization tool that can be used to analyze session data captured by the Kippo SSH honeypot.
Conpot: an ICS/SCADA honeypot that emulates various industrial control systems protocols.
Glastopf: a web application honeypot that emulates vulnerable web applications and captures attack data.
Wordpot: a Wordpress honeypot that emulates a vulnerable Wordpress installation and captures attack data.


Watch video Setup Modern Honeypot Network on Ubuntu | mhn Honeypot online without registration, duration hours minute second in high quality. This video was added by user linux-syr 08 April 2023, don't forget to share it with your friends and acquaintances, it has been viewed on our site 4,04 once and liked it 3 people.