{"id":1039,"date":"2025-11-12T01:14:01","date_gmt":"2025-11-12T01:14:01","guid":{"rendered":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=1039"},"modified":"2025-11-12T01:14:01","modified_gmt":"2025-11-12T01:14:01","slug":"honeypot-setup-for-isc-internship","status":"publish","type":"post","link":"https:\/\/epbrtcybersecurityportfolio.xyz\/?p=1039","title":{"rendered":"Honeypot setup for ISC internship"},"content":{"rendered":"\n<p><br>For my cybersecurity class project, I decided to set up a honeypot on a Raspberry Pi 5. This document chronicles my entire journey &#8211; the successes, the mistakes, and everything I learned along the way. Honestly, it was more challenging than I expected, but also really rewarding when everything finally worked!<br>What I Used for This Project<br>Hardware: Raspberry Pi 5 with 8GB RAM (borrowed from the lab)<br>OS: Raspberry Pi OS Lite (64-bit) &#8211; went with the lite version to save resources<br>Storage: 32GB Class 10 MicroSD Card<br>Network: My home network with an AT&amp;T BGW320-500 router<br>Setting Up the Raspberry Pi<br>I followed this YouTube video: &#8220;CanaKit Raspberry Pi 5 8GB Starter Kit [Turbine] &#8211; Setup Guide&#8221; because I had never set up a Pi before and wanted to make sure I didn&#8217;t break anything.<br>Preparing the SD Card<br>Since I needed a completely fresh setup for this project, I started from scratch:<\/p>\n\n\n\n<p>Downloaded the Raspberry Pi Imager from the official website<br>Installed it on my laptop and got everything ready<br>Put the MicroSD card into the USB reader and connected it<br>Used the imager to set everything up:<\/p>\n\n\n\n<p>Selected &#8220;Raspberry Pi 5&#8221; as my device<br>Chose &#8220;Raspberry Pi OS Lite (64-bit)&#8221; since I didn&#8217;t need the desktop<br>Selected my SD card for storage<\/p>\n\n\n\n<p>Hit &#8220;Write&#8221; and waited. it took like 15 minutes.<br>I finally ejected the card when it was done.<\/p>\n\n\n\n<p>Installing the Heat Sinks<br>This part made me nervous because I&#8217;d never done hardware stuff like this before.<br>What I learned: Take your time with this step! The adhesive is really strong and you only get one shot.<\/p>\n\n\n\n<p>I cleaned the main CPU chip with isopropyl alcohol (used a cotton swab)<br>I carefully peeled off the adhesive backing from the heat sinks<br>I placed the biggest heat sink on the main chip &#8211; held my breath the whole time<br>Pressed down firmly for about 15 seconds<\/p>\n\n\n\n<p>Putting Together the Case<br>This was actually the easiest part. The case design is really well thought out.<\/p>\n\n\n\n<p>I put the Pi board in the bottom piece, making sure everything lined up<br>I connected the cooling fan to the fan header on the Pi.<br>I positioned the fan in the top part of the case<br>I snapped everything together. No screws were needed.<\/p>\n\n\n\n<p>SD Card Installation<br>My mistake: I put the SD card in upside down the first time and was trying to force it.<br>The SD card slot is on the bottom of the Pi. I flipped it over, made sure the label was facing up, and gently pushed it in until it clicked.<\/p>\n\n\n\n<p>First Boot<br>I connected my keyboard and my monitor, plugged in the power supply, and connected everything to my router with an Ethernet cable. When I powered it on, the boot screen came up pretty quickly &#8211; faster than I expected.<br>The setup wizard was straightforward. I picked my country, created my username and password, and skipped the WiFi setup since I was using Ethernet. Then I ran the update commands:<br>sudo apt update<br>sudo apt -uy dist-upgrade<br>This took about 10 minutes on my connection. After that, I rebooted with sudo reboot and was ready for the honeypot installation.<\/p>\n\n\n\n<p>Installing the Honeypot<br>For this part, I followed Dr. Ulrich&#8217;s YouTube video starting from the &#8220;First Connect to Pi&#8221; section. This was where things got really interesting (and challenging).<br>Getting the System Ready<br>First, I needed to make sure I could use the whole SD card and had all the tools I needed:<br>bashsudo raspi-config &#8211;expand-rootfs<br>Then I realized Git wasn&#8217;t installed by default, so I had to add it:<br>bashsudo apt -y install git<br>I created a directory called &#8220;Install&#8221; and went into it to start the real work.<br>Setting Up DShield<br>This is where the actual honeypot magic happens:<\/p>\n\n\n\n<p>Cloned the DShield repository:<br>bashgit clone https:\/\/github.com\/DShield-ISC\/dshield.git<\/p>\n\n\n\n<p>Ran the installation script:<br>bashcd dshield\/bin<br>sudo .\/install.sh<\/p>\n\n\n\n<p>Went through a bunch of dialog boxes &#8211; I just followed the video recommendations<br>Cowrie got installed automatically.<\/p>\n\n\n\n<p>Connecting to ISC<br>I had to create an account on the ISC website to get an API key. Once I had that, I used my email and the key to authenticate my honeypot to their system. Then I went through checking all the configuration parameters to make sure everything was set up correctly.<br>I was then instructed to run a status command to make sure that everything was working properly and this is when I ran into a couple of problems:<\/p>\n\n\n\n<p>Problem #1: ISC-Server Wouldn&#8217;t Start<br>When I tested the honeypot status, the isc-server showed as &#8220;not running&#8221; and I had no idea why.<br>I was pretty frustrated at this point, but I found Guy Bruneau&#8217;s GitHub troubleshooting guide which saved me. The issue was that a log file was missing:<br>bashsudo touch \/var\/log\/dshield.log<br>sudo chown syslog:adm \/var\/log\/dshield.log<br>Then I checked if the service was running:<br>bashsudo systemctl status isc-agent<br>It still wasn&#8217;t working, so I manually started it:<br>bashsudo systemctl start isc-agent<br>This finally got the service running properly.<\/p>\n\n\n\n<p>Problem #2: Nobody Could See My Honeypot<br>The honeypot was running, but it wasn&#8217;t exposed to the internet so no one could find it.<br>The people on the Slack channel told me I needed to set up port forwarding on my router. This was totally new to me, but I figured it out using the help of Claude:<\/p>\n\n\n\n<p>I logged into my AT&amp;T router&#8217;s web interface<br>I found the &#8220;NAT Gaming&#8221; section (took me a while to find this)<br>I set up port forwarding rules to redirect these ports to port 8000:<\/p>\n\n\n\n<p>Port 80 (for web traffic)<br>Port 8080 (alternative web port)<br>Port 7547 (for CWMP)<br>Port 5555 (for personal agent)<br>Port 9000 (for SonarQube)<\/p>\n\n\n\n<p>I applied all the changes and crossed my fingers<br>I waited for a couple of hours for everything to start working properly. This was the hardest part &#8211; just waiting and hoping I did it right.<br>After the waiting period, all the logs started populating and everything was working perfectly.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>For my cybersecurity class project, I decided to set up a honeypot on a Raspberry Pi 5. This document chronicles my entire journey &#8211; the successes, the mistakes, and everything I learned along the way. Honestly, it was more challenging than I expected, but also really rewarding when everything finally worked!What I Used for This [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-1039","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1039","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1039"}],"version-history":[{"count":1,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1039\/revisions"}],"predecessor-version":[{"id":1040,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=\/wp\/v2\/posts\/1039\/revisions\/1040"}],"wp:attachment":[{"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1039"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1039"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/epbrtcybersecurityportfolio.xyz\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1039"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}