This is a toy SSH Honeypot made using Paramiko Module in Pyhton. The Honeypot generates sample terminal text which can be used to befool the hacker. It is a toy baiting system which can be extended to actual honeypot using a vulnerable machine.
o Connections are made using Paramiko in python.
o The default port on which the Honeypot runs is 2222 instead of 22. Reason is quite obvious that we dont want to make our machine's actual SSH port 22 vulnerable.
Installation Toy-Pot
Route SSH port to 2222 for safety
iptables -A PREROUTING -t nat -p tcp --dport 22 -j REDIRECT --to-port 2222
Requirment
ssh-keygen -t rsa -f server.key
Run
pip3 install --upgrade pip
pip3 install -r paramiko
On the Attackers side Use any testing tool of Backtrack(Kali Linux)