Skip to content

Latest commit

 

History

History
52 lines (42 loc) · 1.21 KB

File metadata and controls

52 lines (42 loc) · 1.21 KB

Steps to run (Please go thorough the installation steps) You will require two terminal to simulate the server and the attacker.

At server side python run-honeypot.py

At attacker side ssh -p 2222 localhost

Clone the repo and follow these steps INSTALLATION STEPS

  1. Install the requirements pip install -r requirements.txt
  2. Setup the LLM key in .env file for eg: GOOGLE_API_KEY="AIza*******"

Terminogies regarding the project Asynchronous event-driven networking SSH protocol emulation Credential harvesting Interactive shell simulation Virtualized filesystem abstraction Persistent JSON Lines logging Thread-safe log writing Session isolation Command parsing and tokenization PowerShell-style output formatting CRLF newline normalization Host key management (RSA) Decoy authentication Attack surface reduction Behavioral telemetry collection Honeypot deception techniques Adversarial engagement Network service sandboxing Containerization (Docker support) Python concurrency (asyncio) Dynamic prompt rendering Artifact persistence Forensic data enrichment Remote attacker profiling Event-driven command dispatch Secure append-only logging Automated threat intelligence gathering

ssh -p 2222 localhost