Help capture SSH Honeypot details and valid username and passwords used


Using this post, , I have setup a SSH Honeypot with Kippo.
If you want, you can forward traffic from your own servers to mine and see the results of the SSH capture @

Use this in your IPTables to forward your own port 22 traffic to mine @ IP

Change ethernet device to match yours.

Remember to save your iptables for after reboot. iptables-save
Also, you better set this: sysctl net.ipv4.ip_forward=1 OR echo “1” > /proc/sys/net/ipv4/ip_forward

You can achive the same forwarding results by using
redir ( )
socat ( )
without making use of ip_forward, NAT and masquerading.

1,057 total views, 1 views today

Kippo scripts


This is to gather the IP addresses and the USERNAME and PASSWORDS that were used in the attempts to login to my machines.

393 total views, no views today