Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Objective: Create T - Pot VM and provide screenshot for each step Download the T - Pot ISO file called tpot _ amd 6 4
Objective: Create TPot VM and provide screenshot for each step Download the TPot ISO file called tpotamdiso Then, create a new VM with at least GB of storage in your local Virtual Box installation and install TPot standalone installation Remember to assign the ISO file to the optical drive. Use a NAT adapter during the installation. When finished, change it to Internal. Configure the Virtual Box adapter and the network interface in TPot so that you can communicate from your Kali Linux VM Show that a ping works both ways. Open the browser in Kali and access the web administration dashboard in https:IPTPOT: Once you login with tsec capture a screenshot of the overview. Access by SSH is restricted to only exchanged keys. Hence, the next step is to copy your Kalis public key into the file ~sshauthorizedkeys in tsecs home which does not exist by default. To do it you can use the Terminal option in the administration dashboard or allow copying and pasting through VMs in Virtual Box. Capture a screenshot of the command cat ~sshauthorizedkeys In Kali, execute the command below adapted to your settings to create a tunnel, because the TPot dashboard is only listening locally. ssh p l USER N L:: IPTPOT Then, access the dashboard from Kali with https:localhost: and capture a screenshot. Note: the ssh tunnel might drop eventually, so just create it again if needed. Check that the attack map is empty and capture a screenshot. Perform a bruteforce attack with nmap against the port where the SSH honeypot is You will need to use the scripting engine NSE What command did you use? Note: there are wordlists you can use in usrsharewordlistsmetasploit Check the SecurityMeter. Explain what information is shown. If you intended to use TPot for research purposes capturing information about new trends, what your advice would be regarding where to install the machine, what IP address to use and whether a firewall should be placed before the honeypots?
Objective: Create TPot VM and provide screenshot for each step Download the TPot ISO file called tpotamdiso Then, create a new VM with at least GB of storage in your local Virtual Box installation and install TPot standalone installation Remember to assign the ISO file to the optical drive. Use a NAT adapter during the installation. When finished, change it to Internal. Configure the Virtual Box adapter and the network interface in TPot so that you can communicate from your Kali Linux VM Show that a ping works both ways. Open the browser in Kali and access the web administration dashboard in https:IPTPOT: Once you login with tsec capture a screenshot of the overview. Access by SSH is restricted to only exchanged keys. Hence, the next step is to copy your Kalis public key into the file ~sshauthorizedkeys in tsecs home which does not exist by default. To do it you can use the Terminal option in the administration dashboard or allow copying and pasting through VMs in Virtual Box. Capture a screenshot of the command cat ~sshauthorizedkeys In Kali, execute the command below adapted to your settings to create a tunnel, because the TPot dashboard is only listening locally. ssh p l USER N L:: IPTPOT Then, access the dashboard from Kali with https:localhost: and capture a screenshot. Note: the ssh tunnel might drop eventually, so just create it again if needed. Check that the attack map is empty and capture a screenshot. Perform a bruteforce attack with nmap against the port where the SSH honeypot is You will need to use the scripting engine NSE What command did you use? Note: there are wordlists you can use in usrsharewordlistsmetasploit Check the SecurityMeter. Explain what information is shown. If you intended to use TPot for research purposes capturing information about new trends, what your advice would be regarding where to install the machine, what IP address to use and whether a firewall should be placed before the honeypots?
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started