| Matthew McCorkle
In this post, I will show you the tool gowitness and how it works.
In this post, I will show you the tool Pimp My Kali and how it works.
In this post, I will show you the tool Metasploit and how it works.
In this post, I will show you the tool runZero and how it works.
In this post, I will show you the tool Sherlock and how it works.
In this post, I will show you the tool BloodHound and how it works.
In this post, I will show you the tool PowerView and how it works.
In this post, I will show you the tool CrackMapExec and how it works.
In this post, I will show you the tool Masscan and how it works.
In this post, I will show you the tool HackTools and how it works.
In this post, I will show you the tool Fern WiFi Cracker and how it works.
In this post, I will show you the tool Name-That-Hash and how it works.
In this post, I will show you the tool Sublist3r and how it works.
In this post, I will show you the tool Social-Engineering Toolkit and how it works.
In this post, I will show you the tool Maigret and how it works.
In this post, I will show you the tool RustScan and how it works.
In this post, I will show you the tool pyWhat and how it works.
In this post, I will show you the tool tmpmail and how it works.
In this post, I will show you the tool Pass Station and how it works.
In this post, I will show you the tool Scanless and how it works.
In this post, I will show you the tool WifiInfo and how it works.
In this post, I will show you the tool BruteShark and how it works.
In this post, I will show you the tool sqlmap and how it works.
In this post, I will show you the tool Blackbird and how it works.
In this post, I will show you the tool XSS Hunter and how it works.
In this post, I will show you the tool nuclei and how it works.
In this post, I will show you the tool asciinema and how it works.
In this post, I will show you the tool Kerbrute and how it works.
In this post, I will show you the tool waybackurls and how it works.
In this post, I will show you the tool GoScan and how it works.
In this post, I will show you the resource SecLists and how it works.
In this post, I will show you the tool ffuf and how it works.
In this post, I will show you the tool linPEAS and how it works.
In this post, I will show you the tool PDFCrack and how it works.
In this post, I will show you the tool Cutycapt and how it works.
In this post, I will show you the tool Searchsploit and how it works.
In this post, I will show you the tool Gobuster and how it works.
In this post, I will show you the tool Hydra and how it works.
In this post, I will show you the tool enum4linux and how it works.
In this post, I will show you the tool Nikto and how it works.
In this post, I will show you the tool URLcrazy and how it works.
In this post, I will show you the tool Photon and how it works.
In this post, I will show you the tool Hashid and how it works.
In this post, I will show you the tool Httrack and how it works.
In this post, I will show you the tool goofile and how it works.
In this post, I will show you the tool theHarvester and how it works.
In this post, I will show you the tool Nmap and how it works.
In this post, I will show you the tool Instaloader and how it works.
In this post, I will show you the tool Netdiscover and how it works.
In this post, I will show you the resource HackTricks, by Carlos Polop, and how it works.
In this post, I will show you the tool WPScan and how it works.
In this post, I will show you the tool Cheat.sh and how it works.
In this post, I will show you the tool Steghide and how it works.
In this post, I will show you the tool Dirb and how it works.
In this post, I will show you the tool Nessus and how it works.
In this post, I will show you the tool Kismet and how it works.
In this post, I will show you the tool Lynis and how it works.
In this post, I will show you the tool Cupp and how it works.
In this post, I will show you the tool Legion and how it works.
In this post I will show you the MS-MSDT Follina vulnerability (CVE-2022-30190).
Part 2 of running a T-Pot Honeypot
7. Analysis of Malicious Payload - Example
8. Top Results
9. Most interesting findings
- Commands
- Suricata CVE correlation
- Attack type
- Country of origin
- Unexpected outcomes
- Something I learned and was not aware of prior to setting up the Honeypot
10. What would I do differently next time?
11. Summary
12. What did I learn?
Part 1 - NAHBP
1. What is a honeypot?
2. What did I use my honeypot for?
3. What honeypot setup did I use?
- Minimum requirements for T-Pot
- Honeypots included in T-Pot
- Services & Technologies used
4. Expected outcomes
5. How to setup T-Pot
6. How to analyze logs using Kibana > Discover
- Adbhoney Filtering