Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

Steps to build a docker honeypot

2025-02-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)06/01 Report--

This article mainly introduces the steps of building docker honeypots. In daily operation, I believe many people have doubts about the steps of building docker honeypots. The editor consulted all kinds of materials and sorted out simple and easy-to-use operation methods. I hope it will be helpful for you to answer the doubts about the steps of building docker honeypots. Next, please follow the editor to study!

Background

Recently, I saw the relevant contents of docker building the honeypot of HFish, so I simply built one on my own VPS, and then see how it works.

Steps to build a docker HFish honeypot

1. Pull the image

Docker pull imdevops/hfish

two。 Run the container

Docker run-d-it-p 2100 docker run-d-82eb5b672835-p 2100-p 2200-p 3306-p 5900-p 3306-p 6379-6379-p 808080-p 8081-p 898989-p 9000 000-p 9001 9001-p 9200 9200-p 11211 11211

3. Visit http://IP:9001/dashboard

The default account password is admin | admin, and the access effect is as follows:

4. Test effect

Visit http://IP:9200/ to see the access effect of the honeypot.

Summary

One night after the honeypot was successfully built, a total of 222 recorded messages were received.

Most of them are VNC, and a few are mysql and redis. And most of the attack time is between 21 and 24:00.

Most of the attackers came from abroad, including 80.63% from Uruguay, which also saw Romania, the home of a hacker gang that had been chased before.

Can see the attacker's IP, geographical location, bait time, and so on. Click View, you can see the specific bait information.

The whole process is full of surprises and surprises.

In fact, the most important thing is that the honeypot based on docker has the advantages of low cost, convenience and good effect. If you are interested, you can simply build it.

At this point, the study on the steps of building a docker honeypot is over. I hope to be able to solve your doubts. The collocation of theory and practice can better help you learn, go and try it! If you want to continue to learn more related knowledge, please continue to follow the website, the editor will continue to work hard to bring you more practical articles!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report