SlideShare a Scribd company logo
EmilTan
Team Lead, Co-Founder
http://edgis-security.org
@EdgisSecurity
Research Guide
http://honeynet.sg
Kippo 101
What is honeypot?
 Information system resources which have no production
values.
 Its values lies in unauthorised or illicit use of the resource.
 Its value lies in being probed, attacked, or compromised.
-- Spitzner
 KnowYour Enemy.
Types of Honeypots.
 High Interactions –Actual Machine.
 Low Interactions –A program.
 Honeytokens.
 Hybrid.
Lower Interaction Honeypots
 Honeyd
 Tiny Honeypot
 Dionaea
 Glastopf
 Ghost USB
 Honeyports
 Conpot
 Thug
 Kippo
Emulating SSH
Getting the Codes
 Dependencies
 subversion
 python-twisted
 mysql-server
 python-mysqldb
 mysql-server
 http://kippo.googlecode.com/svn/trunk/
Kippo’s Database
 Tables
 auth
 clients
 downloads
 input
 sensors
 sessions
 ttyplog
Configuring Kippo
 Basic Configuration File: kippo.cfg
 ssh_port = 2222
 iptables –A PREROUTING –t nat –i eth0 –p tcp
--dport 22 –j REDIRECT --to-port 2222
 [database_mysql]
 log – log files
 dl – downloaded files
 honeyfs – virtual file contents
 txtcmds – Commands that output text
Run Kippo!
Demonstration
SpecialThanks to @lvdeijk for Sharing Some RecordedTTYs.
Kippo 101

More Related Content

PDF
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
PDF
[ElasticStack]What happens when you visualize servers exposed to the world?
PPTX
Bsides chicago 2013 honeypots
PDF
Tick group @avar2019 20191111 cha minseok_publish
PDF
A Multidisciplinary Perspective on Cybersecurity
PPT
A Guide to Human Geography
PDF
Introduction to Honeypots
PPTX
【HITCON FreeTalk 2018 - 從晶片設計角度看硬體安全】
[ElasticStack]What happens when you visualize servers exposed to the world?
Bsides chicago 2013 honeypots
Tick group @avar2019 20191111 cha minseok_publish
A Multidisciplinary Perspective on Cybersecurity
A Guide to Human Geography
Introduction to Honeypots

Similar to Kippo 101 (20)

PDF
Honeypot 101 (slide share)
PPT
Anton Chuvakin on Honeypots
PPT
Honeypot honeynet
PPT
Using Canary Honeypots for Network Security Monitoring
PPT
Honeypot-A Brief Overview
PPTX
Honeypots.ppt1800363876
PPTX
Honeypots and honeynets
DOCX
Honeypots
PPT
honeypots.ppt
PPTX
Honeypots
PPT
All about Honeypots & Honeynets
PPTX
PPTX
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
PPT
Honeypot
PPT
Honeypot
PPTX
Bsides detroit 2013 honeypots
PDF
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PDF
Seminar Report on Honeypot
PDF
Honeypots for Active Defense
PPTX
Honey pots
Honeypot 101 (slide share)
Anton Chuvakin on Honeypots
Honeypot honeynet
Using Canary Honeypots for Network Security Monitoring
Honeypot-A Brief Overview
Honeypots.ppt1800363876
Honeypots and honeynets
Honeypots
honeypots.ppt
Honeypots
All about Honeypots & Honeynets
Alexey Sintsov. Honeypot that Can Bite: Reverse Penetration.
Honeypot
Honeypot
Bsides detroit 2013 honeypots
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
Seminar Report on Honeypot
Honeypots for Active Defense
Honey pots
Ad

Recently uploaded (20)

PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Unlocking AI with Model Context Protocol (MCP)
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Electronic commerce courselecture one. Pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Approach and Philosophy of On baking technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
NewMind AI Monthly Chronicles - July 2025
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Unlocking AI with Model Context Protocol (MCP)
“AI and Expert System Decision Support & Business Intelligence Systems”
Encapsulation_ Review paper, used for researhc scholars
Electronic commerce courselecture one. Pdf
Network Security Unit 5.pdf for BCA BBA.
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Review of recent advances in non-invasive hemoglobin estimation
20250228 LYD VKU AI Blended-Learning.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Approach and Philosophy of On baking technology
Digital-Transformation-Roadmap-for-Companies.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
Dropbox Q2 2025 Financial Results & Investor Presentation
Ad

Kippo 101