InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Honeypots 102: Setting up a SANS Internet Storm Center’s DShield Honeypot

Abdul Issa
InfoSec Write-ups
Published in
18 min readMay 23, 2024

--

Honeypot Attacks World Map. (Source: SANS Internet Storm Center)
Honeypot Attacks World Map. (Source: SANS Internet StormCenter)

Introduction

What Is DShield Honeypot?

DShield is a low-interaction honeypot that allows the SANS Internet Storm Center to collect honeypot data for research purposes.

Other Benefits Of Using DShield

Avoid using SANS’s DShield data as a blanket ban list for blocking suspected IPs. Doing so might lead to false positives and block legitimate traffic.

How Does It Work

DShield Honeypot Process Flow
DShield Honeypot Process Flow (Source: SANS Internet Storm Center)

DShield Sensor Components

Cowrie and Web.py components are limited interaction honeypots and do not allow the attacker to execute code.

What Is Collected?

The DShield sensor and honeypot are designed to analyze only Internet traffic from public IP addresses. No internal or non-public data from your honeypot is shared with DShield.

SSH/Telnet Brute Force Attempts

Web Logs

Firewall Logs

Pre-requisites

1. Device Setup

Linode Virtual Private Server Plans
Linode Virtual Private Server Plans
Linode Virtual Private Server
Linode Virtual Private Server

Remember, careful planning and extreme caution are crucial to avoid exposing your network to external threats.

2. Internet Connectivity

Home router firewall example setup
Home router firewall example setup
DMZ Server: Router diverts all unspecified traffic for services to your honeypot
DMZ Server: Router diverts all unspecified traffic for services to your honeypot

3. DShield Account

Internet Storm Center Registration (Sign Up)
Internet Storm Center Registration (Sign Up)
Verify your account email address
Verify your account email address
Account Information: Take a note of your User ID and API Key
Account Information: Take a note of your User ID and API Key
Enable Two-Factor Authentication
Enable Two-Factor Authentication

Setting Up DShield Client

sudo apt update && sudo apt upgrade -y
sudo apt install git python3 python3-pip
cd /opt
sudo git clone https://github.com/DShield-ISC/dshield
sudo /opt/bin/install.sh
Running install.sh script to kick off the installation
Running install.sh script to kick off the installation
Warning Prompt: Confirm with “Yes” after reading
Warning Prompt: Confirm with “Yes” after reading
Privacy Notice Prompt: Confirm with “Yes” after reading
Privacy Notice Prompt: Confirm with “Yes” after reading
Enable Automatic Updates
Enable Automatic Updates
Enter DShield Account Information
Enter DShield Account Information
API Key Verified successfully
API Key Verified successfully
Honeypot device default network interface
Honeypot device default network interface
Lan and Network Access options for external cloud VPS
Lan and Network Access options for external cloud VPS
Honeypot LAN network settings behind a home router
RPi Honeypot LAN network settings behind a home router
Specify IPs and networks to ignore firewall logging for
Specify IPs and networks to ignore firewall logging for
Specify IPs to exclude from honeypot logging and reporting
Specify IPs to exclude from honeypot logging and reporting
Creating an SSL Certificate
Creating an SSL Certificate
Confirm using self-signed SSL certificates for the honeypot
Confirm using self-signed SSL certificates for the honeypot
DShield post-installation screen
DShield post-installation screen
sudo shutdown -r now
sudo /opt/dshield/bin/status.sh
Running DShield status.sh script to verify successful installation
Running DShield status.sh script to verify successful installation

Accessing Your DShield Data

DShield.org Dashboard
DShield.org Dashboard

▶️ My Account

Log Submission Summary
Log Submission Summary

▶️ Firewall Logs

Firewall Log History
Firewall Log History

▶️ Web Honeypot Logs

Web Honeypot Logs
Web Honeypot Logs

▶️ SSH/Telnet Logs

SSH & Telnet Daily Report Summary
SSH & Telnet Daily Report Summary
SSH/Telnet Daily Graphs
SSH/Telnet Daily Graphs

Updating And Tweaking DShield

Option 1: Simple Update Using Git

cd /opt/dshield
git pull
sudo bin/install.sh --update

Option 2: Automatic Updates as Needed

cd /opt/dshield/bin
sudo ./update.sh

DShield Configuration File

DShied Configuration File in /etc/dshield.ini
DShied Configuration File in /etc/dshield.ini

Important Notes On Security

Review of the DShield Honeypot

Pros

Cons

Conclusion

After all, who wouldn’t find it entertaining to watch bots and hackers alike get excited over your honeypot, only to watch them fail?

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Abdul Issa

Penetration Tester, Linux Evangelist, Security Geek, Blogs about Ethical Hacking, CTF, Cybersecurity Career & Certifications. www.linkedin.com/in/abdul-issa

Responses (1)