Script for turning a Raspberry Pi into a Honey Pot Pi. To install, copy these scripts to your Raspberry Pi and execute: chmod +x ./*.sh ./honeypotcreate.sh To start the XRDP honeypot run the following command: ./honeypotstart.sh (or the actual xrdp command) sudo /etc/xrdp/xrdp.sh start The login of failed attempts will be located at: /var/log/xrdp.log You can filter for failed logins in a very crude manner: ./honeypotloggedcredentials.sh (or the actual xrdp command) sudo cat /var/log/xrdp.log | grep USER: ...and check the raw log by typing: ./honeypotrawlog.sh (or the actual xrdp command) sudo cat /var/log/xrdp.log You can also check your Pi's temperature by typing: ./pitemp.sh If you would like to have some live monitoring, which shows the logged credentials and the current date every 30 seconds, type: ./honeypotmonitor.sh The monitor is very useful if you enter LXDE / windowed mode by typing: startx ...then you can open a terminal window and run the honeypotmonitor.sh on one desktop, ...and run etherape on another desktop by typing into a new terminal window: sudo etherape ...and run wireshark on another desktop by typing into a new terminal window: sudo wireshark
Common questions about HoneypotPi including features, pricing, alternatives, and user reviews.
HoneypotPi is Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities. It is a Security Operations solution designed to help security teams with Red Team.
HoneypotPi is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/free5ty1e/honeypotpi/ for download and installation instructions.
Popular alternatives to HoneypotPi include:
Compare all HoneypotPi alternatives at https://cybersectools.com/alternatives/honeypotpi
HoneypotPi is for security teams and organizations that need Red Team. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Head-to-head feature, pricing, and rating breakdowns.
An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.
Cloud-native deception platform deploying dynamic security canaries
AI-powered deception platform using honeypots to detect & disrupt attacks