
One thing I’m thinking might work is using the “run a script” option to call a custom shell script. I doubt would work how you want using Alert Levels. But I’m not sure that different Alert Levels can go via a different method. Great question about different alerts! I do know that PSAD (the main alerting component) has options for Alert Levels. Did you find this useful? Do you have questions? Imagine disconnecting the physical WAN when an breach is detected or shutting down a sensitive machine. Sure this is a toy example, but there are lots of possibilities here. The police siren sounds when an attacker connects to one of the open TCP ports. Here is an example of wiring up a toy police car to trigger an alarm when a breach is detected: These GPIO ports allow your Raspberry Ri to connect to the “real world”. The most exciting improvements could be made using the GPIO ports on the Raspberry Pi. It could have a menu of OSes and services so that HoneyPi could blend into the network better. One of the most obvious would be the ability to choose the type of system you are imitating would be an improvement. There are many ways the HoneyPi could be improved. Please proceed with caution if you are using this Raspberry Pi for other purposes. Most notably, it will change your iptables configuration. Please note: Installing this will change some things on your Raspberry Pi. You’ll need a Raspberry Pi running Rasbian. The real value of HoneyPi is the simple installation script that installs all dependencies and changes necessary settings. It’s a wonderful tool, but can be tricky to set up.
#123 flash chat on raspberry pi 3 full#
Many logged full TCP/UDP sessions and what the attacker did after connecting, but none really logged port-scanning activities.Many honeypots are very complicated to set up and relay data to larger frameworks.I wanted something to go on the internal network for “intrusion detection”. Many honeypots are designed to go on the external perimeter of a network and collect “threat intelligence” data from external attackers, essentially opening all ports and logging all connection attempts.

I tried many existing honeypot offerings, but ran into problems with each one. When I set out on this project, I was hoping to use an existing honeypot to throw on my home network and notify me if someone tries to connect to it. Wrap up these TTPs in a RaspberryPi form factor and you’ve got a simple honeypot that you can add to your network to gain insight when a breach has occured. HoneyPi only flags a few surefire triggers that would catch most attackers snooping around on an internal network: That is why HoneyPi tries to keep it simple compared to other honeypots.

We set out to answer the question What some activities that could be flagged that would catch us when attacking an internal network? There are tons of honeypot options out there, but we leveraged our experience in penetration testing to gain insight into Tactics, Techniques and Procedures (TTPs) that real-world attackers would use. HoneyPi attempts to offer a reliable indicator of compromise with little to no setup or maintenance costs. What are the options for home users and small businesses? What if there were a cheap Raspberry Pi device you could plug into your network that masquerades as a juicy target to hackers?

Let’s face it, unless your organization is big enough to have full packet capture with some expensive IDS, you will likely have no idea if there is an attacker on your network. It is astonishingly easy as an attacker to move around on most networks undetected. HoneyPi – an easy honeypot for a Raspberry Pi
