Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Objective: Create T - Pot VM and provide screenshot for each step Download the T - Pot ISO file called tpot _ amd 6 4

Objective: Create T-Pot VM and provide screenshot for each step Download the T-Pot ISO file called tpot_amd64.iso . Then, create a new VM with at least 20GB of storage in your local Virtual Box installation and install T-Pot (standalone installation). Remember to assign the ISO file to the optical drive. Use a NAT adapter during the installation. When finished, change it to Internal. Configure the Virtual Box adapter and the network interface in T-Pot so that you can communicate from your Kali Linux VM. Show that a ping works both ways. Open the browser in Kali and access the web administration dashboard in https://IP_T-POT:64294. Once you login with tsec, capture a screenshot of the overview. Access by SSH is restricted to only exchanged keys. Hence, the next step is to copy your Kalis public key into the file ~/.ssh/authorized_keys (in tsecs home), which does not exist by default. To do it, you can use the Terminal option in the administration dashboard or allow copying and pasting through VMs in Virtual Box. Capture a screenshot of the command cat ~/.ssh/authorized_keys. In Kali, execute the command below (adapted to your settings) to create a tunnel, because the T-Pot dashboard is only listening locally. ssh -p 64295-l USER -N -L8080:127.0.0.1:64297 IP_T-POT Then, access the dashboard from Kali with https://localhost:8080 and capture a screenshot. Note: the ssh tunnel might drop eventually, so just create it again if needed. Check that the attack map is empty and capture a screenshot. Perform a brute-force attack with nmap against the port 22, where the SSH honeypot is. You will need to use the scripting engine (NSE). What command did you use? Note: there are wordlists you can use in /usr/share/wordlists/metasploit. Check the SecurityMeter. Explain what information is shown. If you intended to use T-Pot for research purposes capturing information about new trends, what your advice would be regarding where to install the machine, what IP address to use and whether a firewall should be placed before the honeypots?

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Introduction To Data Mining

Authors: Pang Ning Tan, Michael Steinbach, Vipin Kumar

1st Edition

321321367, 978-0321321367

More Books

Students also viewed these Databases questions