Virtual Machine Honeypot
Format
A script to install our honeypot onto your existing Virtual Machine, configured to appear as a valuable asset but designed to detect and log malicious activity. Issued as a Curl command, with configuration to select a personality from the following options:
- Windows server 2016 - ports 135, 139, 445, 3389
- Windows 10 workstation - ports 80, 137, 138, 443, 445, 3389, 5353
- Microsoft Active Directory Domain Controller 2019 - ports 21, 53, 69, 88, 135, 139, 389, 445, 464, 636, 3268, 3269, 3389
- Linux 5.0 - ports 22, 80, 443
- Printer - ports 80, 443, 515, 631, 9100
- FreeNAS storage device - ports 139, 445
- Siemens Simatic S7-300 PLC - port 102
- Cisco Catalyst 2950 Switch - port 22
Capabilities
Activity Logging: Continuous logging and monitoring of all interactions with the VM honeypot, the seedata.io platform raises an event each time the VM honeypot is accessed. Each event includes detailed threat analysis of the accessing entity and their activities.
Usage
Deploy our VM honeypots within your network to attract and detect malicious actors, providing early warning and detailed insights into attack methods.
Last updated