↑ Return to Miscellaneous

Dionaea-Vagrant

Dionaea-Vagrant provides a Vagrant configuration file (Vagrantfile) and shell scripts to automate the setup of a Dioanea malware honeypot virtual machine.

REQUIREMENTS

1. VirtualBox
2. Vagrant

QUICK INSTALLATION:

git clone https://github.com/ikoniaris/dionaea-vagrant && cd dionaea-vagrant
vagrant up

This will download (only the first time) a virtual disk, create a new Ubuntu 12.04 LTS VM on the fly and start it, install Dionaea and all of its dependencies and execute it as daemon along with p0f. And that’s it!

You can then login into the machine by typing “vagrant ssh” or using an SSH client (e.g. PuTTY) and connect to localhost:2222 — username: vagrant, password: vagrant. Once inside the VM, type “ifconfig” to find out the IP address assigned to the bridged adapter (eth1), which you can use to forward ports from your home router back to the VM. For a list of ports used by Dionaea type “sudo netstat -antp | grep dionaea”. If you want to stop the machine type “vagrant halt” (on the outer terminal, not inside the machine).

Every time you want to start the honeypot VM a simple “vagrant up” issued inside the dionaea-vagrant directory is enough!

Read previous post:
To Kill a Centrifuge (Stuxnet Analysis)
Case Study: 10 Steps to Agile Development without Compromising Enterprise Security
phpBrowserStack
phpLogClass
Miscellaneous
Close