{"id":344,"date":"2023-06-04T04:17:52","date_gmt":"2023-06-04T03:17:52","guid":{"rendered":"https:\/\/learncyber.tech\/?p=344"},"modified":"2023-06-04T04:27:56","modified_gmt":"2023-06-04T03:27:56","slug":"how-to-install-a-honeypot-on-a-virtual-machine","status":"publish","type":"post","link":"https:\/\/learncyber.tech\/?p=344","title":{"rendered":"How to Install a Honeypot on a Virtual Machine"},"content":{"rendered":"\n<p>In this article, you will learn how to install and configure Internet Storm Center&#8217;s (ISC) DShield Honeypot on an Ubuntu Server VM. If you don&#8217;t have the VM installed yet, you can refer to our article on <a href=\"https:\/\/learncyber.tech\/?p=299\">How to Install Ubuntu Server on VirtualBox<\/a>.<\/p>\n\n\n\n<p>Before we start, let&#8217;s talk a little bit about honeypots and the Internet Storm Center.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What is a Honeypot?<\/h3>\n\n\n\n<p>Imagine a honeypot like a trap or a decoy. In cybersecurity, a honeypot is a fake system or network designed to look appealing to hackers. When attackers try to break into it, security researchers can observe their techniques and learn how to protect real systems better.<\/p>\n\n\n\n<p>Implementing a honeypot in a network is important for security research because it provides a safe environment to study and understand the tactics of hackers without putting real systems at risk. It helps researchers learn about new threats, identify vulnerabilities, and develop stronger defenses to keep actual networks safe from similar attacks.<\/p>\n\n\n\n<p>The Internet Storm Center (ISC) is a project by the SANS Institute, a prominent cybersecurity training and research organization. The ISC serves as a global cooperative cybersecurity effort that monitors and analyzes internet security issues, including malicious activities, vulnerabilities, and emerging threats.<\/p>\n\n\n\n<p>The primary mission of the Internet Storm Center is to provide a platform for the collection, analysis, and dissemination of information related to cybersecurity incidents. It serves as a centralized hub for researchers, security professionals, and network administrators to share information and collaborate on addressing ongoing threats.<\/p>\n\n\n\n<p>The DShield Honeypot is a low interaction honeypot that mimics a vulnerable system and allows ISC to collect data for research purposes.<\/p>\n\n\n\n<p>If you want to know more about ISC, you can visit their website here: <a href=\"https:\/\/isc.sans.edu\/\">SANS Internet Storm Center<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Getting Started<\/h2>\n\n\n\n<p>Configure the network settings for your Ubuntu VM:<\/p>\n\n\n\n<ol>\n<li>Click on the VM and click on <strong>Settings<\/strong><\/li>\n\n\n\n<li>A dialog box will open, click on <strong>Network<\/strong><\/li>\n\n\n\n<li>Click <strong>Adapter 1<\/strong> then click <strong>Enable Network Adapter<\/strong><\/li>\n\n\n\n<li>In the <em>Attached to<\/em> field, select <strong>Bridged Adapter<\/strong><\/li>\n\n\n\n<li>Select the appropriate interface then click <strong>OK<\/strong><\/li>\n<\/ol>\n\n\n\n<p>This configuration will assign a unique IP address to the virtual machine as if it were a separate device on your network. This will allow you to expose the honeypot to the internet so it can gather valuable intelligence.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"259\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/network-settings-1024x259.png\" alt=\"\" class=\"wp-image-408\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/network-settings-1024x259.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/network-settings-300x76.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/network-settings-768x194.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/network-settings-820x207.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/network-settings.png 1246w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Start your Ubuntu Server and log in to your account.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img decoding=\"async\" loading=\"lazy\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/youre-in-congrats-2.png\" alt=\"\" class=\"wp-image-346\" width=\"804\" height=\"604\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/youre-in-congrats-2.png 804w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/youre-in-congrats-2-300x225.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/youre-in-congrats-2-768x577.png 768w\" sizes=\"(max-width: 804px) 100vw, 804px\" \/><\/figure>\n\n\n\n<p>Create a user called <strong>&#8220;dshield&#8221;<\/strong> by typing the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server<\/strong><strong>:<\/strong>\/$ sudo adduser dshield<\/code><\/pre>\n\n\n\n<p><strong>Note: <\/strong>You will be prompted for a password because adding new users requires root privileges.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1198\" height=\"674\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudo-adduser-edited.png\" alt=\"\" class=\"wp-image-402\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudo-adduser-edited.png 1198w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudo-adduser-edited-300x169.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudo-adduser-edited-1024x576.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudo-adduser-edited-768x432.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudo-adduser-edited-820x461.png 820w\" sizes=\"(max-width: 1198px) 100vw, 1198px\" \/><\/figure>\n\n\n\n<p>Enter information for the new user, you can enter <strong>&#8216;dshield&#8217;<\/strong> for the <em>Full Name<\/em> field and just leave the rest of the fields blank by pressing <strong>Enter<\/strong>. Type <strong>Y<\/strong> to say <em>Yes<\/em> to the prompt.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1203\" height=\"677\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-info-edited.png\" alt=\"\" class=\"wp-image-403\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-info-edited.png 1203w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-info-edited-300x169.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-info-edited-1024x576.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-info-edited-768x432.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-info-edited-820x461.png 820w\" sizes=\"(max-width: 1203px) 100vw, 1203px\" \/><\/figure>\n\n\n\n<p>Here we can see the newly created user:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img decoding=\"async\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/check-if-user-exists-edited-2.png\" alt=\"\" class=\"wp-image-404\" width=\"840\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/check-if-user-exists-edited-2.png 828w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/check-if-user-exists-edited-2-300x169.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/check-if-user-exists-edited-2-768x432.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/check-if-user-exists-edited-2-820x461.png 820w\" sizes=\"(max-width: 828px) 100vw, 828px\" \/><\/figure>\n\n\n\n<p>Now update the server by typing the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>\/$ sudo apt update &amp;&amp; sudo apt upgrade<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"309\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sudo-update-1024x309.png\" alt=\"\" class=\"wp-image-350\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sudo-update-1024x309.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sudo-update-300x90.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sudo-update-768x232.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sudo-update-820x247.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sudo-update.png 1204w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Type <strong>Y<\/strong> to say <em>Yes<\/em> to the prompt. This will upgrade the packages installed on your system.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"605\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/type-y-1024x605.png\" alt=\"\" class=\"wp-image-351\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/type-y-1024x605.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/type-y-300x177.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/type-y-768x454.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/type-y-820x484.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/type-y.png 1195w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Now reboot the virtual machine.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>\/$ sudo reboot<\/code><\/pre>\n\n\n\n<p>After reboot, log back in with your credentials.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"771\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-back-1024x771.png\" alt=\"\" class=\"wp-image-354\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-back-1024x771.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-back-300x226.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-back-768x578.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-back-820x618.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/welcome-back.png 1203w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Check if git is installed on the server by typing:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~$ which git<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"170\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/which-git-1024x170.png\" alt=\"\" class=\"wp-image-364\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/which-git-1024x170.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/which-git-300x50.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/which-git-768x127.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/which-git-820x136.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/which-git.png 1201w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Before you start installing DShield, first sign up for an account on Internet Storm Center through this link: <a href=\"https:\/\/isc.sans.edu\/register.html\">Register &#8211; SANS Internet Storm Center<\/a>. Enter the required information and click <strong>Sign Up<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"728\" height=\"1024\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sign-up-for-an-account-728x1024.png\" alt=\"\" class=\"wp-image-355\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sign-up-for-an-account-728x1024.png 728w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sign-up-for-an-account-213x300.png 213w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sign-up-for-an-account-612x860.png 612w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/sign-up-for-an-account.png 736w\" sizes=\"(max-width: 728px) 100vw, 728px\" \/><\/figure>\n\n\n\n<p>Log in to your account: <a href=\"https:\/\/isc.sans.edu\/login.html\">Internet Storm Center<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"784\" height=\"490\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-in-to-your-account-edited.png\" alt=\"\" class=\"wp-image-407\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-in-to-your-account-edited.png 784w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-in-to-your-account-edited-300x188.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-in-to-your-account-edited-768x480.png 768w\" sizes=\"(max-width: 784px) 100vw, 784px\" \/><\/figure>\n\n\n\n<p>After logging in you will see your account information. Under <em>My Account<\/em>, you can see your <em>User ID #<\/em> as well as your <em>API Key<\/em>, take note of the key because you will need it later.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"478\" height=\"259\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/my-account.png\" alt=\"\" class=\"wp-image-357\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/my-account.png 478w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/05\/my-account-300x163.png 300w\" sizes=\"(max-width: 478px) 100vw, 478px\" \/><\/figure>\n\n\n\n<p>Create a directory called &#8220;install&#8221;. This directory will be where we clone the GIT repository.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~$ mkdir install<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"187\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/mkdir-install-1024x187.png\" alt=\"\" class=\"wp-image-363\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/mkdir-install-1024x187.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/mkdir-install-300x55.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/mkdir-install-768x140.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/mkdir-install-820x150.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/mkdir-install.png 1204w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Change into the <em>install<\/em> directory.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~$ cd install<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"182\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-install-1024x182.png\" alt=\"\" class=\"wp-image-365\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-install-1024x182.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-install-300x53.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-install-768x137.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-install-820x146.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-install.png 1201w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Run the following command to clone the <em>dshield.git<\/em> repository to the <em>Install<\/em> directory:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~\/install$ git clone https:\/\/github.com\/DShield-ISC\/dshield.git<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"237\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/git-clone-1024x237.png\" alt=\"\" class=\"wp-image-366\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/git-clone-1024x237.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/git-clone-300x70.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/git-clone-768x178.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/git-clone-820x190.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/git-clone.png 1203w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>You can verify the <em>dshield.git<\/em> repository has been cloned to the <em>Install<\/em> directory by typing:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~\/install$ ls -l<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"164\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/verify-d-shield-1024x164.png\" alt=\"\" class=\"wp-image-367\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/verify-d-shield-1024x164.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/verify-d-shield-300x48.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/verify-d-shield-768x123.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/verify-d-shield-820x131.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/verify-d-shield.png 1206w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Change into the <em>dshield\/bin<\/em> directory.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~\/install$ cd dshield\/bin\/<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"121\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-dshieldbin-1024x121.png\" alt=\"\" class=\"wp-image-369\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-dshieldbin-1024x121.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-dshieldbin-300x35.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-dshieldbin-768x91.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-dshieldbin-820x97.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/cd-dshieldbin.png 1204w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Run the following command to execute the install script in the <em>bin<\/em> directory:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~\/install\/dshield\/bin$ sudo .\/install.sh<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"293\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudoinstallsh-1024x293.png\" alt=\"\" class=\"wp-image-370\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudoinstallsh-1024x293.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudoinstallsh-300x86.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudoinstallsh-768x220.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudoinstallsh-820x235.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sudoinstallsh.png 1197w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p id=\"8497\">The installation script will now begin to run. This will take a while; you can read one of our articles at <a href=\"https:\/\/learncyber.tech\/\">LEARNCYBER<\/a> while waiting for it to finish.<\/p>\n\n\n\n<p id=\"0012\">You will be prompted with a <em>WARNING<\/em> message verifying that you&#8217;re aware that you&#8217;re turning the system into a honeypot. Select<strong> Yes<\/strong> to proceed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"876\" height=\"342\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/warning.png\" alt=\"\" class=\"wp-image-371\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/warning.png 876w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/warning-300x117.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/warning-768x300.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/warning-820x320.png 820w\" sizes=\"(max-width: 876px) 100vw, 876px\" \/><\/figure>\n\n\n\n<p>Select <strong>Yes<\/strong> to acknowledge that you are participating in ISC&#8217;s research project.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"757\" height=\"331\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/privacy.png\" alt=\"\" class=\"wp-image-372\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/privacy.png 757w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/privacy-300x131.png 300w\" sizes=\"(max-width: 757px) 100vw, 757px\" \/><\/figure>\n\n\n\n<p id=\"636d\">The next screen will ask if you\u2019d like updates to be done automatically or manually. It\u2019s recommended you choose automatic. Select <strong>OK<\/strong> to proceed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"544\" height=\"430\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/automatic.png\" alt=\"\" class=\"wp-image-373\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/automatic.png 544w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/automatic-300x237.png 300w\" sizes=\"(max-width: 544px) 100vw, 544px\" \/><\/figure>\n\n\n\n<p id=\"e737\">You need to enter your E-Mail Address and API Key to move forward. After that, select <strong>Verify<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"748\" height=\"325\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-account-info.png\" alt=\"\" class=\"wp-image-375\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-account-info.png 748w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dshield-account-info-300x130.png 300w\" sizes=\"(max-width: 748px) 100vw, 748px\" \/><\/figure>\n\n\n\n<p id=\"cb61\">Your API Key will be verified, and you\u2019ll be allowed to move to the next step. Select <strong>OK<\/strong> to continue.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"507\" height=\"216\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/API-valid.png\" alt=\"\" class=\"wp-image-376\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/API-valid.png 507w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/API-valid-300x128.png 300w\" sizes=\"(max-width: 507px) 100vw, 507px\" \/><\/figure>\n\n\n\n<p id=\"aa34\">For the interface, leave the default option selected then select <strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"514\" height=\"277\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/default-interface.png\" alt=\"\" class=\"wp-image-377\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/default-interface.png 514w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/default-interface-300x162.png 300w\" sizes=\"(max-width: 514px) 100vw, 514px\" \/><\/figure>\n\n\n\n<p id=\"a801\">The next step will configure admin access, you can just leave it at default then <strong>OK<\/strong>.<\/p>\n\n\n\n<p id=\"352a\"><strong>Note:<\/strong> Your local network will vary from the screenshot, it may use 10.x.x.x or 192.x.x.x. Verify your network settings before proceeding.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"747\" height=\"385\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip.png\" alt=\"\" class=\"wp-image-390\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip.png 747w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-300x155.png 300w\" sizes=\"(max-width: 747px) 100vw, 747px\" \/><\/figure>\n\n\n\n<p id=\"1248\">Press <strong>Enter<\/strong> to <strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"469\" height=\"217\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-2.png\" alt=\"\" class=\"wp-image-391\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-2.png 469w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-2-300x139.png 300w\" sizes=\"(max-width: 469px) 100vw, 469px\" \/><\/figure>\n\n\n\n<p id=\"d2fc\">Next you can enter the IP addresses that the firewall will not log and will not redirect to the honeypot ports. Ensure your local network is entered in the field then select <strong>OK<\/strong> to proceed to the next step.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"871\" height=\"319\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-3.png\" alt=\"\" class=\"wp-image-392\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-3.png 871w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-3-300x110.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-3-768x281.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-3-820x300.png 820w\" sizes=\"(max-width: 871px) 100vw, 871px\" \/><\/figure>\n\n\n\n<p id=\"75d6\">Select <strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"469\" height=\"196\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-4.png\" alt=\"\" class=\"wp-image-393\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-4.png 469w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-4-300x125.png 300w\" sizes=\"(max-width: 469px) 100vw, 469px\" \/><\/figure>\n\n\n\n<p id=\"12ca\">The next screen allows you to enter <em>IPs<\/em> and <em>Ports<\/em> to disable the honeypot for to prevent reporting internal access attempts. Again, ensure your local network is entered in the field. You can leave the default options for the <em>Honeypot Ports<\/em> then <strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"868\" height=\"316\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-5.png\" alt=\"\" class=\"wp-image-394\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-5.png 868w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-5-300x109.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-5-768x280.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-5-820x299.png 820w\" sizes=\"(max-width: 868px) 100vw, 868px\" \/><\/figure>\n\n\n\n<p id=\"374a\">Select <strong>OK<\/strong>.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"586\" height=\"220\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-6.png\" alt=\"\" class=\"wp-image-395\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-6.png 586w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/New-ip-6-300x113.png 300w\" sizes=\"(max-width: 586px) 100vw, 586px\" \/><\/figure>\n\n\n\n<p>It will perform further configurations.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"160\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/further-config-1024x160.png\" alt=\"\" class=\"wp-image-384\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/further-config-1024x160.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/further-config-300x47.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/further-config-768x120.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/further-config-820x128.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/further-config.png 1210w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>In the following screen you can create an SSL certificate. You can opt to use the default information given or enter your own. Select <strong>OK<\/strong> when you&#8217;re done.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"622\" height=\"385\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/SSL-cert.png\" alt=\"\" class=\"wp-image-385\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/SSL-cert.png 622w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/SSL-cert-300x186.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/figure>\n\n\n\n<p id=\"561c\">The script can create a Certificate Authority (CA) to sign the certificate, select <strong>Yes<\/strong> to proceed.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"622\" height=\"264\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-certificate.png\" alt=\"\" class=\"wp-image-386\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-certificate.png 622w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/sign-certificate-300x127.png 300w\" sizes=\"(max-width: 622px) 100vw, 622px\" \/><\/figure>\n\n\n\n<p id=\"4da3\">Now <strong>reboot<\/strong> the machine.<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server:<\/strong>~\/install\/dshield\/bin$ reboot<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"666\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/Postinstall-1024x666.png\" alt=\"\" class=\"wp-image-387\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/Postinstall-1024x666.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/Postinstall-300x195.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/Postinstall-768x499.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/Postinstall-820x533.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/Postinstall.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After rebooting, you will notice the line saying &#8220;<em>DShield Honeypot<\/em>&#8220;, this indicates that you have successfully turned your Ubuntu Server into a honeypot, however, it\u2019s still not accessible from the public internet. To do so, you need perform a few more configurations. <\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"764\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/after-reboot-login-1024x764.png\" alt=\"\" class=\"wp-image-389\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/after-reboot-login-1024x764.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/after-reboot-login-300x224.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/after-reboot-login-768x573.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/after-reboot-login-820x612.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/after-reboot-login.png 1204w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p id=\"7eca\">First you need to find and copy the IP address of your default gateway. To do this, go to your command prompt and enter the following command:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>C:\\Users\\learncyber&gt;<\/strong>ipconfig<\/code><\/pre>\n\n\n\n<p id=\"7eca\">Open a web browser and paste the IP address. It will show a warning similar to the one below. Click on <strong>Advanced<\/strong> then click <strong>Proceed<\/strong> to continue to the next step.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"1017\" height=\"249\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/connection-not-private.png\" alt=\"\" class=\"wp-image-418\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/connection-not-private.png 1017w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/connection-not-private-300x73.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/connection-not-private-768x188.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/connection-not-private-820x201.png 820w\" sizes=\"(max-width: 1017px) 100vw, 1017px\" \/><\/figure>\n\n\n\n<p id=\"7eca\">You need to configure your router to use the Ubuntu Server VM as your DMZ host, this process will vary based on your network setup. Make sure you entered the IP address of your VM.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"462\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dmz-host-1024x462.png\" alt=\"\" class=\"wp-image-419\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dmz-host-1024x462.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dmz-host-300x135.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dmz-host-768x347.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dmz-host-820x370.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/dmz-host.png 1465w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p id=\"e58c\">You can find the IP address of your machine by typing:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code><strong>learncyber@ubuntu-server<\/strong><strong>:<\/strong>~$ hostname -I<\/code><\/pre>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"121\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/hostname-i-1024x121.png\" alt=\"\" class=\"wp-image-420\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/hostname-i-1024x121.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/hostname-i-300x35.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/hostname-i-768x91.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/hostname-i-820x97.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/hostname-i.png 1203w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>After applying the changes, you can test your set up by using a free <a href=\"https:\/\/www.ipvoid.com\/port-scan\/\">Online Port Scanner<\/a> to scan your public IP address (which is then internally forwarded to the Ubuntu VM&#8217;s address). Your results should show something similar to the images below.<\/p>\n\n\n\n<p><strong>Note:<\/strong> If you don&#8217;t know your router&#8217;s public IP address, just type <em>&#8220;what&#8217;s my ip<\/em>&#8221; on your favorite search engine.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"778\" height=\"1024\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-778x1024.png\" alt=\"\" class=\"wp-image-421\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-778x1024.png 778w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-228x300.png 228w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-768x1010.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-654x860.png 654w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results.png 856w\" sizes=\"(max-width: 778px) 100vw, 778px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" loading=\"lazy\" width=\"856\" height=\"910\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-2.png\" alt=\"\" class=\"wp-image-422\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-2.png 856w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-2-282x300.png 282w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-2-768x816.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/results-2-809x860.png 809w\" sizes=\"(max-width: 856px) 100vw, 856px\" \/><\/figure>\n\n\n\n<p>Your honeypot is now exposing these ports to the internet.<\/p>\n\n\n\n<p id=\"a13f\">Logs will be sent to DShield every 30 minutes. You can check out the logs by logging in to your DShield account and going to your dashboard. These are the logs after a few hours of running the honeypot:<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"415\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log-1024x415.png\" alt=\"\" class=\"wp-image-425\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log-1024x415.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log-300x122.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log-768x311.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log-1536x623.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log-820x332.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/firewall-log.png 1564w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p><em>Firewall Logs<\/em><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" loading=\"lazy\" width=\"1024\" height=\"515\" src=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs-1024x515.png\" alt=\"\" class=\"wp-image-424\" srcset=\"https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs-1024x515.png 1024w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs-300x151.png 300w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs-768x386.png 768w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs-1536x773.png 1536w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs-820x412.png 820w, https:\/\/learncyber.tech\/wp-content\/uploads\/2023\/06\/web-logs.png 1672w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p id=\"c6c0\"><em>Web Honeypot Logs<\/em><\/p>\n\n\n\n<p>All of these data are collected by the Internet Storm Center and are aggregated with data from other honeypots giving them a global view and understanding of the emerging threat landscape.<\/p>\n\n\n\n<p>Congratulations! You now have successfully installed and ran DShield Honeypot on your Ubuntu Server.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this article, you will learn how to install and configure Internet Storm Center&#8217;s (ISC) DShield Honeypot on an Ubuntu Server VM. If you don&#8217;t have the VM installed yet, you can refer to our article on How to Install Ubuntu Server on VirtualBox. Before we start, let&#8217;s talk a little bit about honeypots and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[3,2],"tags":[14,13,5,9],"_links":{"self":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts\/344"}],"collection":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=344"}],"version-history":[{"count":24,"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/learncyber.tech\/index.php?rest_route=\/wp\/v2\/posts\/344\/revisions\/430"}],"wp:attachment":[{"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/learncyber.tech\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}