The commenters have spoken! I will create a crash course on this project. Before I do, I am going to add a few more "advanced" features (as I overviewed at 14:54) to the honeypot, including a small dashboard, tarpit (to trap the skids), and dockerize the application. Stay tuned for a follow-up video and a crash course in the next ~6 weeks.
Small correction: You don't actually need to run the script as root to accept incoming connections on port 22, and you *really* shouldn't. The smarter approach (this is how my personal website is configured, for example) is to have the script and bind to an unprivileged port (e.g. 1234) and then use a firewall like iptables to redirect incoming traffic from the privileged port to the unprivileged port, in this case something like 22 -> 1234
These are the kind of videos and projects that will set you apart in the job market. You need to have real cyber security projects done that will highlight your skills. Don't get too comfortable in your job you might lose it anytime. Also, stop downplaying your work by saying "small", just directly say honeypot.
This is really cool! Crazy seeing connections coming from all over the world I looked up those IPs on whois China, Argentina, Singapore. Super interesting!
I’ve tried something similar with the T-Pot project a while ago and gathered some interesting insights about the attackers and which infrastructure they use. Maybe you want to give this also a try.
i would love to host this but how would i run this along with sshd so i can actually access my vps? can iptables forward traffic to two ports while only sending one's traffic back?
Another way would be to setup ssh without password and monitor ~/.bash_history and get the ip address from /var/logs/auth.log. Interesting idea though. Great video!!
@@cvpherhack3r819 Giving a real SSH session makes it easier for attackers to exploit the system. They can also easily clear or remove the .bash_history
@@cvpherhack3r819 you can run any unprivileged command (rm, python3, git, etc) even privileged commands if the hackers find a way to do privilege escalation
@@cvpherhack3r819 if hackers are given a real ssh session, it will increase the attack surface. also, they can easily remove the .bash_history, and we can't monitor what they do.
The commenters have spoken! I will create a crash course on this project. Before I do, I am going to add a few more "advanced" features (as I overviewed at 14:54) to the honeypot, including a small dashboard, tarpit (to trap the skids), and dockerize the application. Stay tuned for a follow-up video and a crash course in the next ~6 weeks.
Grant are you able to hack and return my account?
a crash course on this is something i would definitely tune in to
Small correction: You don't actually need to run the script as root to accept incoming connections on port 22, and you *really* shouldn't. The smarter approach (this is how my personal website is configured, for example) is to have the script and bind to an unprivileged port (e.g. 1234) and then use a firewall like iptables to redirect incoming traffic from the privileged port to the unprivileged port, in this case something like 22 -> 1234
Great to know! I was trying to find a way to do this. Now I know.
You can also change some Linux kernel configs to allow unprivileged users to listen to certain privileged ports, but this way is more secure.
@@joopie46614 You *can* do that, but it makes a lot more sense to just change the firewall configuration to set up a port redirect.
You can use netcap for the user or binary.
But having fun is the most important. Worst case your vps provider closes your account, whatever
These are the kind of videos and projects that will set you apart in the job market. You need to have real cyber security projects done that will highlight your skills. Don't get too comfortable in your job you might lose it anytime. Also, stop downplaying your work by saying "small", just directly say honeypot.
Let's go with the crash course plsss
Sounds good! I will make note of this.
9:21 test interactiv input is every time most important
This is really cool! Crazy seeing connections coming from all over the world I looked up those IPs on whois China, Argentina, Singapore. Super interesting!
Fun project, going to be building some more advanced features soon.
Would love to see more of this please!
I’ve tried something similar with the T-Pot project a while ago and gathered some interesting insights about the attackers and which infrastructure they use. Maybe you want to give this also a try.
This is very interesting. Especially if you can do anything to the bots
would love a crash course this is awesome
nice video. please more videos on hostinger vps projects. keep it up
Please Continue this Course
Let’s see that course brother🙌
crash course is highly required
you finally woke up!
Great video Grant!!
dark mode is cool
Great content
Is it legal to malware your honey pot to catch local adversary?
the backslashes were painful.
From the results... Yep they were.
Wish I will create mine
This video is awesome! The additional project ideas you mentioned could definitely be turned into a fully-fledged application. Well done!
I will take that as a +1 for continuing on with the project!
i would love to host this but how would i run this along with sshd so i can actually access my vps? can iptables forward traffic to two ports while only sending one's traffic back?
Netcat
this wallpaper is awesome😍link please !
Crash courseeeeeeeeee! :)
Crash course, or something alike.
Crash course please
Crash course
Please make a crashcourse on this!
crash course
Bro your hairline is crying.
Sir do you earn 200k dollars a year in USA? Plz reply. Thanks a lot.
)))))
Another way would be to setup ssh without password and monitor ~/.bash_history and get the ip address from /var/logs/auth.log. Interesting idea though. Great video!!
that's too risky
@@patarisac why so?
@@cvpherhack3r819 Giving a real SSH session makes it easier for attackers to exploit the system. They can also easily clear or remove the .bash_history
@@cvpherhack3r819 you can run any unprivileged command (rm, python3, git, etc) even privileged commands if the hackers find a way to do privilege escalation
@@cvpherhack3r819 if hackers are given a real ssh session, it will increase the attack surface. also, they can easily remove the .bash_history, and we can't monitor what they do.
Hacker du dimanche surtout 😂😹😹😹🙀😂🤡🤡🤡🤏
Crash course
crash course
crash course
It's on the way. Currently working on "advanced features" this week. Will start crash course development soon.