Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. Honeypot Deployment Pro Tip: Let Them Think They're Winning

Honeypot Deployment Pro Tip: Let Them Think They're Winning

Scheduled Pinned Locked Moved Uncategorized
cybersecurityinfosechoneypotdeceptiontech
2 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rnbwkat@infosec.exchangeR This user is from outside of this forum
    rnbwkat@infosec.exchangeR This user is from outside of this forum
    rnbwkat@infosec.exchange
    wrote last edited by
    #1

    Honeypot Deployment Pro Tip: Let Them Think They're Winning

    Want to know a dirty little secret about honeypot deployment that I've been using for years?

    When you spin up a new production server with SSH access, don't immediately lock it down behind a non-standard port. Let it sit on port 22 running your actual SSH daemon for the first 4-6 weeks.

    Let the attackers find it. Let them probe it. Let them catalog it in their target lists as "real infrastructure worth attacking."

    Then, after they've committed you to memory:

    Move your real SSH to a non-standard port. Deploy OpenCanary SSH on port 22 configured to match the EXACT version banner of whatever you were running before.

    Now here's the magic: The attackers think they're still hitting the same production system. But you're collecting every username and password combination they try. They don't know they've been demoted from "attacking production" to "feeding your threat intelligence."

    It's totally deceptive. They invested weeks cataloging your server. They're not going to just give up because you didn't respond the way they expected.

    I've been running this technique for years across my global honeypot network. Works every single time.

    Remember to match the SSH version banner exactly - down to the patch level. OpenSSH 8.2p1 vs 8.2p2 matters to some scanners. Make it identical.

    This is how you turn production infrastructure into long-term intelligence gathering without anyone noticing the transition.

    You're welcome. 🦩
    @sashatheflamingo #cybersecurity #infosec #honeypot #deceptiontech

    H 1 Reply Last reply
    1
    0
    • rnbwkat@infosec.exchangeR rnbwkat@infosec.exchange

      Honeypot Deployment Pro Tip: Let Them Think They're Winning

      Want to know a dirty little secret about honeypot deployment that I've been using for years?

      When you spin up a new production server with SSH access, don't immediately lock it down behind a non-standard port. Let it sit on port 22 running your actual SSH daemon for the first 4-6 weeks.

      Let the attackers find it. Let them probe it. Let them catalog it in their target lists as "real infrastructure worth attacking."

      Then, after they've committed you to memory:

      Move your real SSH to a non-standard port. Deploy OpenCanary SSH on port 22 configured to match the EXACT version banner of whatever you were running before.

      Now here's the magic: The attackers think they're still hitting the same production system. But you're collecting every username and password combination they try. They don't know they've been demoted from "attacking production" to "feeding your threat intelligence."

      It's totally deceptive. They invested weeks cataloging your server. They're not going to just give up because you didn't respond the way they expected.

      I've been running this technique for years across my global honeypot network. Works every single time.

      Remember to match the SSH version banner exactly - down to the patch level. OpenSSH 8.2p1 vs 8.2p2 matters to some scanners. Make it identical.

      This is how you turn production infrastructure into long-term intelligence gathering without anyone noticing the transition.

      You're welcome. 🦩
      @sashatheflamingo #cybersecurity #infosec #honeypot #deceptiontech

      H This user is from outside of this forum
      H This user is from outside of this forum
      hotarubiko@infosec.exchange
      wrote last edited by
      #2

      @rnbwkat @sashatheflamingo This is the way.

      1 Reply Last reply
      0
      • mttaggart@infosec.exchangeM mttaggart@infosec.exchange shared this topic
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups