**Time spent: 10 hours spent in total
Objective: Create a honeynet using MHN-Admin. Present your findings as if you were requested to give a brief report of the current state of Internet security. Assume that your audience is a current employer who is questioning why the company should allocate anymore resources to the IT security team.
Summary: How did you deploy it? Did you use GCP, AWS, Azure, Vagrant, VirtualBox, etc.?
- I deployed the MHN-Admin using Google Cloud SDK. I put the command line gcloud compute ssh mhn-admin in my GCP and activated my MHN-admin.
- After that, I went through steps to create the honeypot VM.
Summary: Briefly in your own words, what does dionaea do? - Dionea traps malaware exploiting vulnerabilities that are exposed in the network offered by services. The goal is to access a copy of the malaware.
Summary: What is the RDBMS that MHN-Admin uses? What information does the exported JSON file record? MHN-Admin uses MongoDB In the JSON file, it contains protocal's name, time of attack, source ip, source and destination port, identifier and the name of honeypot The JSON file is in the same repository
Be sure to upload session.json directly to this GitHub repo/branch in order to get full credit.