top of page

How to Make a Honeypot in 30 Minutes

  • Jul 13, 2024
  • 4 min read

Updated: 13 hours ago



How to Make a Honeypot in 30 Minutes

This 30-minute Azure honeypot project is a fake computer system or network that looks real but isn’t used for critical work. It’s designed to attract hackers who are up to no good. This is How to Make a Honeypot in 30 minutes.


Just like a bee is drawn to honey, hackers are drawn to these honeypots because they seem like easy targets. Once they try to break in, cybersecurity experts can watch what the hackers are doing.


Think of it as a decoy house in a neighborhood. Burglars might try to break in, thinking it’s an easy target, but instead, they get caught in the act!


Most of the activity you’ll see in the honeypot is automated bots, billions of them, scanning the internet nonstop, looking for vulnerable hosts. It doesn’t take 5 seconds after your host is deployed on the internet to see voracious attacks in every direction.


That is what we’re doing here: we will create a Debian VM on Azure, install T-pot, and open up the gates to let anyone and anything in contact with it. Then I’m going to let you poke around and play with all the features of a T-pot.


T-pot Honey Pot
T-pot Honey Pot

Creating a Virtual Machine

The first thing you will do is go to the Azure Portal and sign up for an account if you don’t already have one. Once you do, you will get $200 in free credits added to your account. That will cover more than the lab's charges.


new virtual machine
Figure 1-1

Once you have created an account, at the top search bar type in “Virtual Machine” and you will be brought to the screen in Figure 1–1. Click the button to create a new virtual machine.



Figure 1–2 Create New Resource Group
Figure 1–2 Create New Resource Group

Then create a new resource group and name it “tpot-rg” as shown in Figure 1–2.


A resource is the individual service that you will be consuming, and a resource group is a group of these resources together.

This project will have a few resources like the Virtual Machine, Public IP address, Network Security Group,… etc that will be inside of this resource group. When you are finished with the lab, all that you need to do is delete the resource group to delete this entire project.


Figure 1-3
Figure 1–3

  • Name the virtual machine, “tpot-vm”

  • Set the region to "East US"

  • Set No Infrastructure Redundancy Required

  • Set the security type to “standard”

  • Click see all images and select “Ubuntu 24.04 LTS Noble Numbat - x64 Gen1”


Figure 1-4 - Choose Size
Figure 1-4 - Choose Size

  • Choose size “Standard_A2m_v2 — 2 vcpus, 16 GiB memory”



Figure 1-5: Set Username and Password
Figure 1-5: Set Username and Password

  • Select password authentication type

  • Choose username ‘azureuser’ and type a password

  • Click “Next: Disks"



Figure 1-6: Change OS Disk
Figure 1-6: Change OS Disk
  • Change the disk size to 128GiB

  • Click Next


Figure 1–7 Check Box, Click Next
Figure 1–7 Check Box, Click Next



  • Check the box to delete the public IP and NIC when the VM is deleted

  • Click “Next: Management”




Figure 1–8 Click Review and Create, and then Create
Figure 1–8 Click Review and Create, and then Create

  • Click “Review + create” at the top

  • Click “Create” to create your new VM

  • Wait for your VM deployment to finish



Figure 1–9: Deployment Finished
Figure 1–9: Deployment Finished



Open Traffic Flow


Now we need to open up the gates and create a rule to allow all communication into the honeypot. This will allow the adversaries to attack the honeypot, so you can collect the data.


  • At the top search bar, type in “tpot-vm-nsg” and select the network security group resource


Figure 2–1: Select the Network Security Group We Created
Figure 2–1: Select the Network Security Group We Created

  • Select “Inbound security rules” on the left



Figure 2–2 Select Inbound Security Rules
Figure 2–2 Select Inbound Security Rules

Figure 2–2 Select Inbound Security Rules


  • Click “Add”



Figure 2–3 Click Add
Figure 2–3 Click Add
  • Change Destination port ranges to start “*”

  • Change Priority to “100”

  • Change Name to “DANGER_ALLOW_ALL”

  • Click “Add”


This rule on the Network Security Group applies to all resources in the network security group and allows ALL traffic on ALL ports inside. This is not recommended anywhere at any time except right now.






Figure 2–4 Change Destination Port Range, Priority, and Name, then click Add
Figure 2–4 Change Destination Port Range, Priority, and Name, then click Add


Configuring the honeypot


Now we need to go grab the public IP address for the VM, as its time to log into the VM.


  • Type in “tpot-vm” in the search bar at the top and select the resource


Figure 3–1 Go to the tpot-vm resource
Figure 3–1 Go to the tpot-vm resource

  • Copy the Public IP address to the clipboard


Figure 3–2 Copy the Public IP address
Figure 3–2 Copy the Public IP address

Windows now has the ability to SSH from the command prompt in Win 10 and Win 11, and Mac and Linux also allow SSH from the terminal. Go ahead and SSH into the host:


ssh azureuser@<public ip address>

Figure 3–3 SSH into the honeypot
Figure 3–3 SSH into the honeypot

  • Execute these commands

env bash -c "$(curl -sL https://github.com/telekom-security/tpotce/raw/master/install.sh)"

Select "Hive" install

sudo reboot (when finished)

Note: The installation script changes the port to SSH on, so if you want to ssh to it you have to use this syntax "ssh azureuser@<ip address> -p 64295"

You can now log in to the honeypot web interface via


https://<ipaddress>:64297

Be sure to delete the resource group to delete all resources when you're finished!






2 comentarios


Miembro desconocido
19 jul 2024

This is awesome. Thanks for the fix

Me gusta
Tyler Wall
Tyler Wall
25 jul 2024
Contestando a

You're very welcome :)

Me gusta

Get Your Dream Cybersecurity Job

Cyber NOW

Courses  :  Certifications  :  Cyber Range  :  Job Boards  :  Knowledge Base  :  Webinars  :  WhatsApp Community

Jump Start Your SOC Analyst Career

Get the new book, Jump-start Your SOC Analyst Career, authored by Tyler Wall.  

 

Winner of the 2024 Cybersecurity Excellence Awards in the category of Best Cybersecurity Book!

  • LinkedIn
  • Facebook

Contact us

bottom of page