Question: Objective: Create T - Pot VM and provide screenshot for each step Download the T - Pot ISO file called tpot _ amd 6 4

Objective: Create T-Pot VM and provide screenshot for each step Download the T-Pot ISO file called tpot_amd64.iso . Then, create a new VM with at least 20GB of storage in your local Virtual Box installation and install T-Pot (standalone installation). Remember to assign the ISO file to the optical drive. Use a NAT adapter during the installation. When finished, change it to Internal. Configure the Virtual Box adapter and the network interface in T-Pot so that you can communicate from your Kali Linux VM. Show that a ping works both ways. Open the browser in Kali and access the web administration dashboard in https://IP_T-POT:64294. Once you login with tsec, capture a screenshot of the overview. Access by SSH is restricted to only exchanged keys. Hence, the next step is to copy your Kalis public key into the file ~/.ssh/authorized_keys (in tsecs home), which does not exist by default. To do it, you can use the Terminal option in the administration dashboard or allow copying and pasting through VMs in Virtual Box. Capture a screenshot of the command cat ~/.ssh/authorized_keys. In Kali, execute the command below (adapted to your settings) to create a tunnel, because the T-Pot dashboard is only listening locally. ssh -p 64295-l USER -N -L8080:127.0.0.1:64297 IP_T-POT Then, access the dashboard from Kali with https://localhost:8080 and capture a screenshot. Note: the ssh tunnel might drop eventually, so just create it again if needed. Check that the attack map is empty and capture a screenshot. Perform a brute-force attack with nmap against the port 22, where the SSH honeypot is. You will need to use the scripting engine (NSE). What command did you use? Note: there are wordlists you can use in /usr/share/wordlists/metasploit. Check the SecurityMeter. Explain what information is shown. If you intended to use T-Pot for research purposes capturing information about new trends, what your advice would be regarding where to install the machine, what IP address to use and whether a firewall should be placed before the honeypots?

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!