Skip to content

BecomingCyber/Honeypot-on-Kali-Linux

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 

Repository files navigation

🍯 Kali Linux Honeypot Lab – PentBox on Port 443

CySA+ Project: This lab showcases defensive skills using a decoy service (honeypot) on Kali Linux to detect and observe intrusion attempts, mapping to CompTIA Security+ and CySA+ objectives around detection, logging, and threat analysis.

Platform Tool Level Status Focus Cert Goal

📌 Overview

This lab demonstrates how to set up a simple honeypot on Kali Linux using PentBox, then generate and observe intrusion attempts against it.
The honeypot is configured to listen on TCP port 443, and a browser connection to https://<kali-ip> triggers an INTRUSION ATTEMPT DETECTED log entry.


🎯 Objectives

By completing this lab, you will be able to:

  • Identify the inet IP of a Linux host on interface eth0.
  • Install and launch a PentBox honeypot on Kali Linux.
  • Configure the honeypot to listen on a specific TCP port (443).
  • Generate traffic to the honeypot and observe how intrusion attempts are logged.
  • Explain how honeypots support detection, logging, and analysis in blue-team operations.

🛠️ Tools & Environment

  • OS: Kali Linux (lab VM)
  • User: ucertify / root (per lab instructions)
  • Tool: PentBox 1.8 (Ruby-based security toolkit with honeypot module)
  • Network: eth0 with IPv4 inet address (e.g., 10.1.217.52 in this run)

🧪 Lab Steps & Evidence

1. Determine inet IP (eth0)

In the Kali terminal:

ifconfig

Under eth0, record the IPv4 inet address:

eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST> mtu 1500
inet 10.1.217.52 netmask 255.0.0.0 broadcast 10.255.255.255
...

Result: eth0 inet IP = 10.1.217.52 (value used for the rest of the lab).

Screenshot idea: ifconfig eth0 inet IP showing ifconfig with inet 10.1.217.52.


2. Install and launch PentBox

From the terminal (as root or using sudo):

apt update
apt install git ruby -y
cd /opt
git clone https://github.com/technicaldada/pentbox.git
cd pentbox/pentbox-1.8
chmod +x pentbox.rb

Launch PentBox:

sudo ./pentbox.rb

Select:

  1. 2Network Tools
  2. 3Honeypot

Screenshot idea: PentBox main menu showing the PentBox main menu with “Network tools” and “Honeypot” options.


3. Configure honeypot on port 443 (manual mode)

In the PentBox Honeypot menu:

  • Choose 2Manual Configuration.
  • Port: 443
  • False message: Caught You !!
  • Save log: y (use default log file)
  • Beep: n

PentBox then reports:

HONEYPOT ACTIVATED ON PORT 443 (2026-03-19 17:09:44 -0700)

Screenshot idea: Honeypot activated on port 443 showing the honeypot activated on port 443.


4. Generate an intrusion attempt

Open a browser on Kali and browse to:

https://10.1.217.52

Because the honeypot is not a real HTTPS service, Firefox shows:

  • Secure Connection Failed
  • Error code: SSL_ERROR_RX_RECORD_TOO_LONG

This indicates traffic is reaching port 443, but the TLS handshake is invalid—exactly what we expect from a simple honeypot.

Screenshot idea: Browser HTTPS to honeypot - Secure Connection Failed

Browser attempting HTTPS to https://10.1.217.52 and showing “Secure Connection Failed”. You can also generate traffic from a second terminal:

nc 10.1.217.52 443
# type some text, press Enter a few times, then Ctrl+C

5. Observe intrusion detection in PentBox

Return to the PentBox terminal window. After the browser or nc connection, PentBox logs:

HONEYPOT ACTIVATED ON PORT 443 (2026-03-19 17:09:44 -0700)
INTRUSION ATTEMPT DETECTED! from 10.1.217.52:52466 (2026-03-19 17:42:44 -0700)

This confirms the honeypot detected and logged the intrusion attempt, including:

  • Source IP: 10.1.217.52
  • Source port: 52466
  • Timestamp

Screenshot idea: Honeypot intrusion log showing the INTRUSION ATTEMPT DETECTED! line in the PentBox terminal.


🧠 Key Concepts

  • Honeypot: A decoy system or service designed to attract attackers and record their activity, without exposing real assets.
  • Decoy port (443): Often associated with HTTPS; running a fake service here makes scanning and enumeration more interesting to attackers.
  • Detection vs. Prevention: Honeypots do not primarily block attacks; they observe and log them, providing telemetry and insight into attacker behavior.
  • Log-based detection: SOC and blue-team analysts can use honeypot logs to detect scanning, brute force attempts, and suspicious traffic patterns.

🔐 Blue-Team / SOC Perspective

Attackers may:

  • Scan the network for open ports (Nmap, masscan, etc.).
  • Probe services on common ports (22/80/443) to fingerprint and exploit them.
  • Interact with decoy services without realizing they are being monitored.

Defenders can:

  • Use honeypots as early-warning sensors for scanning and probing activity.
  • Enrich threat intelligence with attacker IPs, tools, and patterns.
  • Test detection rules and logging pipelines without risking production systems.

In a SOC, this lab maps directly to creating high-signal telemetry sources that highlight hostile reconnaissance.


🚀 Outcome

In this lab, you:

  • Identified the Kali VM’s eth0 IP address (10.1.217.52).
  • Deployed a PentBox honeypot on TCP port 443.
  • Sent traffic to https://10.1.217.52 and observed a Secure Connection Failed browser error.
  • Confirmed that PentBox logged the activity as:
    INTRUSION ATTEMPT DETECTED! from 10.1.217.52:52466 (...).

This demonstrates practical understanding of honeypot setup, traffic generation, and intrusion detection on a Linux host.


📚 Certification Mapping

CompTIA Security+ (SY0‑701)

  • 1.5: Explain the importance of efficiency and process improvement in security operations (using honeypots to improve detection and telemetry).
  • 2.x / 3.x: Topics around monitoring, logging, and detection of attacks on network services.

CompTIA CySA+ (CS0‑003)

  • 1.x – Threat and vulnerability management: Using decoy systems to detect and study attacker behavior.
  • 2.x – Security operations and monitoring: Collecting and analyzing honeypot logs as part of continuous monitoring.
  • 3.x – Incident response: Using honeypot-derived indicators (IPs, methods) to support triage and containment.

🗂 Repo Structure (Suggested)

Honeypot-on-Kali-Linux/
├── README.md                  # This file
├── Notes/
│   └── honeypot-concepts.md   # Honeypot theory, SOC use cases, exam mapping
└── Screenshots/
    ├── ifconfig.png
    ├── PentBox main menu.png
    ├── Honeypot activated on port 443.png
    ├── honeypot-https-failed.png
    └── honeypot-intrusion-log.png

✍️ Author

Author: Mozella L. McCoy-Flowers (BecomingCyber)
Role: Cybersecurity & Digital Forensics Student – Virginia State University
Focus: Blue-team homelabs, threat detection, and incident response

About

Honeypot lab on Kali Linux using PentBox to detect intrusion attempts on TCP port 443. Blue-team focused project mapped to CompTIA Security+ and CySA+ objectives.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors