🍯Built an SSH Honeypot from scratch. Here's what I learned. Instead of faking a shell and hoping attackers don't notice, I built a Man-in-the-Middle proxy — the honeypot sits between the attacker and a real decoy VM, forwarding everything bidirectionally while logging every credential and command. Attackers get a fully functional Linux shell. They have no idea they're being watched. Some of the decisions I'm proud of: → Randomized authentication delay — accepts login after a random number of attempts per attacker. A honeypot that accepts every password immediately is trivially detected. This one behaves like a real server with a strong password. → Credential memory — once credentials are accepted, repeat logins stay consistent. A real server remembers your password. So does this one. → Dual logging — real-time .log file for live monitoring + SQLite for structured queries. When it's deployed on a public IP, I'll be able to query the most common passwords attackers use, attack frequency by IP, and what commands they run after getting in. Tech stack: Python, Paramiko, Socket, Threading, SQLite, python-dotenv Building both sides — offensive and defensive — is the fastest way to actually understand security. If you know how a honeypot works, you know how to bypass one. If you know how to bypass one, you know how to harden it. Code is on my GitHub. Link in comments. #CyberSecurity #EthicalHacking #Python #SSH #PenTesting #Networking #InfoSec #StudentProject #SOCAnalyst

To view or add a comment, sign in

Explore content categories