Skip to content

Latest commit

 

History

History
76 lines (46 loc) · 2.92 KB

README.md

File metadata and controls

76 lines (46 loc) · 2.92 KB

T-POT Honeypot Project

A comprehensive guide and documentation for setting up a T-POT honeypot on a VPS, aimed at cybersecurity students. Includes step-by-step instructions, configuration tips, and insights into using T-POT for capturing and analyzing malicious traffic.


🚀 Key Features

  • Emulates a variety of services and protocols to attract attackers.
  • Captures and logs malicious traffic for in-depth analysis.
  • Provides valuable insights into attacker techniques and tools.
  • Easy to deploy and manage, making it accessible for cybersecurity professionals and enthusiasts alike.

🛠️ Setup

  1. Install T-POT on a dedicated machine or virtual environment.
  2. Configure T-POT to emulate the desired services and protocols.
  3. Monitor the logs and analyze captured traffic for malicious activity.

💡 Usage


🖼️ Screenshots

Image1

Image2

Image3

Image4

Image links fixed by Pralin Khaira

🤝 Contribution

Contributions to this project are welcome! If you have ideas for improvements or new features, feel free to submit a pull request.


📝 License

This project is licensed under the MIT License - see the LICENSE file for details.


🙏 Acknowledgements

Special thanks to the developers of T-POT for creating this powerful honeypot framework. The project is open-source and has contributions from various developers and contributors. You can find more details about the developers and contributors on the T-POT GitHub Repository.


📬 Contact

For questions or feedback, please contact the project maintainer: