Skip to content
/ Honeynet Public

A lightweight honeynet simulation using Docker Compose to emulate common attack surfaces via vulnerable SSH, FTP, and HTTP services.

License

Notifications You must be signed in to change notification settings

Rzfn2/Honeynet

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

6 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ›‘οΈ Honeynet Project

A lightweight, professional-grade honeynet built using Docker Compose. This project emulates vulnerable SSH, FTP, and HTTP services to attract attackers, log behavior, and support blue team analysis. Ideal for labs, research, or security monitoring use cases.


πŸ“Έ Screenshots

image image image image image image image


✨ Highlights

  • Dockerized honeypots: SSH, FTP, HTTP
  • Modular architecture: each service runs independently
  • Logs attacker interactions in real-time
  • SIEM-ready: logs can be forwarded to external systems
  • VLAN-ready for isolated deployment

βš™οΈ Deployment Guide

βœ… Requirements

  • Ubuntu Server 20.04+
  • Docker & Docker Compose
  • Root or sudo privileges

πŸ“¦ Installation

# Install Docker and Docker Compose
sudo apt update && sudo apt install -y docker.io docker-compose

# Clone the honeynet repository
git clone https://github.com/Rzfn2/Honeynet.git
cd honeynet

# Build honeypot containers
sudo docker-compose build

# Start the honeynet
sudo docker-compose up -d

πŸ”‘ SSH Key Setup

To avoid SSH permission issues during testing:

# Generate key pair if needed
ssh-keygen -t rsa -b 2048 -f ~/.ssh/id_rsa
chmod 600 ~/.ssh/id_rsa

🌐 VLAN Network Isolation

Isolate your honeynet from the host or production environment:

# Create VLAN interface (e.g. VLAN ID 10)
sudo ip link add link ens33 name ens33.10 type vlan id 10

# Assign IP
sudo ip addr add 192.168.10.1/24 dev ens33.10

# Activate VLAN
sudo ip link set up ens33.10

Ensure Docker containers are bridged to this VLAN manually or through custom network configurations.


🌍 Honeypot Services

Protocol Container Port
SSH ssh_honeypot 2222
FTP ftp_honeypot 21
HTTP http_honeypot 8080

πŸ§ͺ Testing Interaction

From your attacker machine (e.g., Kali Linux):

# SSH
ssh test@<ip> -p 2222

# FTP
ftp <ip>

# HTTP
curl http://<ip>:8080

πŸ“ Log Files

Service Log Path
SSH audit.log, cmd_audit.log
FTP logs/ftp_audit.log
HTTP logs/http_audit.log

Access logs with:

sudo docker exec -it ssh_honeypot cat audit.log

πŸ”’ Security Recommendations

  • Deploy in a VLAN for network isolation
  • Restrict outbound container traffic
  • Forward logs to ELK/Splunk/SIEM

🧾 License

MIT License β€” for academic, SOC testing, and cybersecurity research use only.


πŸ‘€ Author

Made by Abdullah

Feedback and professional collaboration are welcome. ⭐

About

A lightweight honeynet simulation using Docker Compose to emulate common attack surfaces via vulnerable SSH, FTP, and HTTP services.

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published