- Популярные видео
- Авто
- Видео-блоги
- ДТП, аварии
- Для маленьких
- Еда, напитки
- Животные
- Закон и право
- Знаменитости
- Игры
- Искусство
- Комедии
- Красота, мода
- Кулинария, рецепты
- Люди
- Мото
- Музыка
- Мультфильмы
- Наука, технологии
- Новости
- Образование
- Политика
- Праздники
- Приколы
- Природа
- Происшествия
- Путешествия
- Развлечения
- Ржач
- Семья
- Сериалы
- Спорт
- Стиль жизни
- ТВ передачи
- Танцы
- Технологии
- Товары
- Ужасы
- Фильмы
- Шоу-бизнес
- Юмор
Turning Router Into Fake Telnet Trap Honeypot Hack ! #shorts
Cisco Config (Honeypot on TCP/2323 – vty 5):**
service timestamps log datetime
logging buffered 10000
! Create dummy username & password
username honeypot privilege 1 secret HoneyPot123
! Enable AAA for login
aaa new-model
aaa authentication login HONEY local
! Assign vty 5 to listen on port 2323
line vty 5
transport input telnet
rotary 1
login authentication HONEY
! Enable the rotary service so that port 2323 maps to vty 5
ip tcp rotary 1 2323
OR
! Stop default Telnet port 23 access
access-list 99 deny any
line vty 0 4
access-class 99 in
! EEM Applet to catch login attempts
event manager applet LOG-HONEY-POT
event syslog pattern "LOGIN_SUCCESS.*honeypot"
action 1.0 syslog msg "HONEYPOT ALERT: Someone is trying to Telnet!"
```
## 📘 **Line-by-Line Description (Commands Explained):**
* `service timestamps log datetime` → adds date/time to log entries
* `logging buffered 10000` → stores logs in router memory
* `username honeypot ...` → creates fake victim login
* `aaa new-model` → turns on authentication features
* `aaa authentication login HONEY local` → makes local usernames valid
* `line vty 5` → creates hidden Telnet line only used for trap
* `transport input telnet` → only allow Telnet on this line
* `rotary 1` → marks vty 5 for rotary port use
* `login authentication HONEY` → forces attacker to enter credentials
* `ip tcp rotary 1 2323` → listens on TCP port 2323 for our “honeypot vty”
* `event manager applet ...` → creates EEM script
* `event syslog pattern "LOGIN_SUCCESS.*honeypot"` → triggers on successful login using trap account
* `action syslog ...` → writes ALERT message in router log to warn you
#cisco #honeypot #coresahnetworks #router #routerconfiguration #networksecurity #telnet #ethicalhacking #gns3 #cybersecurity #ccna #pentesting #hacker #honeypottarot #ciscosecurity #networksecurity #hardening
Видео Turning Router Into Fake Telnet Trap Honeypot Hack ! #shorts канала CoreSah Networks
service timestamps log datetime
logging buffered 10000
! Create dummy username & password
username honeypot privilege 1 secret HoneyPot123
! Enable AAA for login
aaa new-model
aaa authentication login HONEY local
! Assign vty 5 to listen on port 2323
line vty 5
transport input telnet
rotary 1
login authentication HONEY
! Enable the rotary service so that port 2323 maps to vty 5
ip tcp rotary 1 2323
OR
! Stop default Telnet port 23 access
access-list 99 deny any
line vty 0 4
access-class 99 in
! EEM Applet to catch login attempts
event manager applet LOG-HONEY-POT
event syslog pattern "LOGIN_SUCCESS.*honeypot"
action 1.0 syslog msg "HONEYPOT ALERT: Someone is trying to Telnet!"
```
## 📘 **Line-by-Line Description (Commands Explained):**
* `service timestamps log datetime` → adds date/time to log entries
* `logging buffered 10000` → stores logs in router memory
* `username honeypot ...` → creates fake victim login
* `aaa new-model` → turns on authentication features
* `aaa authentication login HONEY local` → makes local usernames valid
* `line vty 5` → creates hidden Telnet line only used for trap
* `transport input telnet` → only allow Telnet on this line
* `rotary 1` → marks vty 5 for rotary port use
* `login authentication HONEY` → forces attacker to enter credentials
* `ip tcp rotary 1 2323` → listens on TCP port 2323 for our “honeypot vty”
* `event manager applet ...` → creates EEM script
* `event syslog pattern "LOGIN_SUCCESS.*honeypot"` → triggers on successful login using trap account
* `action syslog ...` → writes ALERT message in router log to warn you
#cisco #honeypot #coresahnetworks #router #routerconfiguration #networksecurity #telnet #ethicalhacking #gns3 #cybersecurity #ccna #pentesting #hacker #honeypottarot #ciscosecurity #networksecurity #hardening
Видео Turning Router Into Fake Telnet Trap Honeypot Hack ! #shorts канала CoreSah Networks
cisco router honeypot telnet hack honeypot tutorial gns3 lab cisco hacking how to trap hackers cybersecurity lab ethical hacking honeypot router telnet port unused port security ccna security network attack detection eem script cisco trap attacker telnet create fake telnet honeypot configuration cisco ios hack security trap network network security lab cisco short video youtube shorts hacking router fake login hacker detection router
Комментарии отсутствуют
Информация о видео
20 августа 2025 г. 11:54:17
00:01:46
Другие видео канала





















