rdppot
A honeypot system that simulates RDP services on port 3389, automatically assigns virtual machines to incoming connections, and captures comprehensive forensic data including packet captures and disk images.

rdppot
A honeypot system that simulates RDP services on port 3389, automatically assigns virtual machines to incoming connections, and captures comprehensive forensic data including packet captures and disk images.
Go Beyond the Directory. Track the Entire Market.
Monitor competitor funding, hiring signals, product launches, and market movements across the whole industry.
rdppot Description
rdppot is a honeypot system that simulates RDP (Remote Desktop Protocol) services by listening on port 3389. When a connection is established, the system creates a session and assigns a virtual machine from a pre-configured pool to that session. The tool automatically manages session lifecycles with configurable timeouts - sessions terminate after 300 seconds by default or after 30 seconds of inactivity. During active sessions, rdppot captures comprehensive forensic data including full packet captures (pcap) and disk image copies. The system integrates with Suricata for network traffic analysis, running intrusion detection against captured packets. All collected data including disk images, packet captures, and Suricata analysis results are stored together for later examination. rdppot requires several dependencies including qemu for virtualization, libvirt for virtual machine management, Python 3.7 for core functionality, Suricata for network analysis, and tcpdump for packet capture. The tool includes installation instructions for Suricata configuration.
rdppot FAQ
Common questions about rdppot including features, pricing, alternatives, and user reviews.
rdppot is A honeypot system that simulates RDP services on port 3389, automatically assigns virtual machines to incoming connections, and captures comprehensive forensic data including packet captures and disk images.. It is a Security Operations solution designed to help security teams with Digital Forensics, Network Security, Packet Capture.
FEATURED
Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
Fractional CISO services for B2B companies to build security programs
POPULAR
Real-time OSINT monitoring for leaked credentials, data, and infrastructure
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
TRENDING CATEGORIES
Stay Updated with Mandos Brief
Get strategic cybersecurity insights in your inbox