Honeypot

Honeypot

One-liner: A decoy system designed to attract attackers, detect intrusion attempts, and gather intelligence on attacker tactics and tools.

🎯 What Is It?

A Honeypot is a deliberately vulnerable or enticing system deployed to detect unauthorized access attempts. Honeypots serve as early warning systems and intelligence gathering tools. Any interaction with a honeypot is suspicious by definition, since legitimate users have no reason to access it.

πŸ”¬ How It Works

Normal Network:                    With Honeypots:
β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”           β”Œβ”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”
β”‚   Real Servers      β”‚           β”‚   Real Servers      β”‚
β”‚                     β”‚           β”‚                     β”‚
β”‚  β”Œβ”€β”€β”€β” β”Œβ”€β”€β”€β” β”Œβ”€β”€β”€β” β”‚           β”‚  β”Œβ”€β”€β”€β” β”Œβ”€β”€β”€β” β”Œβ”€β”€β”€β” β”‚
β”‚  β”‚Webβ”‚ β”‚DB β”‚ β”‚Appβ”‚ β”‚           β”‚  β”‚Webβ”‚ β”‚DB β”‚ β”‚Appβ”‚ β”‚
β”‚  β””β”€β”€β”€β”˜ β””β”€β”€β”€β”˜ β””β”€β”€β”€β”˜ β”‚           β”‚  β””β”€β”€β”€β”˜ β””β”€β”€β”€β”˜ β””β”€β”€β”€β”˜ β”‚
β”‚                     β”‚           β”‚                     β”‚
β”‚  Attacker scans     β”‚           β”‚  β”Œβ”€β”€β”€β” ← Honeypot  β”‚
β”‚  real systems       β”‚           β”‚  β”‚πŸ―β”‚    (Decoy)   β”‚
β”‚                     β”‚           β”‚  β””β”€β”€β”€β”˜              β”‚
β”‚                     β”‚           β”‚    β”‚                β”‚
β”‚                     β”‚           β”‚  Alert! Attacker   β”‚
β”‚                     β”‚           β”‚  touched honeypot  β”‚
β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜           β””β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”€β”˜

πŸ“Š Types of Honeypots

By Interaction Level

Type Description Risk Intelligence
Low Interaction Emulates services, limited functionality Low Basic IOCs
Medium Interaction Partial service emulation Medium TTPs, tools
High Interaction Full systems, real OS/services High Complete intel

By Purpose

Type Purpose Examples
Production Detect attacks on real network Network honeypots
Research Study attacker behavior University honeynets
Deception Waste attacker time/resources Fake credentials, files

Common Honeypot Tools

Tool Type Emulates
Cowrie Medium SSH/Telnet
Dionaea Low Multiple protocols
HoneyD Low Network hosts
Kippo Medium SSH
T-Pot Platform Multiple honeypots
Conpot Low ICS/SCADA

🍯 Honeytokens

Honeytokens are data-based traps (non-system honeypots):

Honeytoken Purpose
Fake credentials Detect credential theft/use
Canary files Detect data exfiltration
Database records Detect unauthorized access
AWS keys Detect cloud credential theft
DNS canaries Detect internal recon

πŸ›‘οΈ Deployment Considerations

Benefits

Risks

🎀 Interview Angles

Common Questions

STAR Story

Situation: Needed to detect lateral movement within the internal network.
Task: Deploy detection mechanisms that had zero false positives.
Action: Deployed internal honeypots emulating file servers and domain controllers. Created honeytoken credentials in LSASS.
Result: Detected an attacker using stolen credentials to access the honeypot, enabling early containment before production systems were compromised.

βœ… Best Practices

πŸ“š References