Hands-On Training for Cyber Defense using Honeypots - T-pot Cloud Setup
- Shubham Khichi
- Mar 31, 2021
- 1 min read
Updated: Jul 2, 2023

31 Mar 2021
Shubham Khichi
Learn how to deploy T-pot on practically any cloud environment and monitor the attacks IRL!
By Shubham Khichi - Linkedin:
Bonus Content: Flow chart of popular honeypots you can deploy on your systems.
https://whimsical.com/cyber-deception-shubham-khichi-GoYYetQ94zviguWZ9Apgi5@2Ux7TurymMh28DAoCtgH
Things you need!
Download T-Pot from https://github.com/telekom-security/tpotce#installation
A cloud instance (GCP, AWS, Azure, DO Droplets) anything which will represent a cloud enterprise environment.
Patience to learn
The Learning Objective?
The idea is to simulate an attack surface and allow only those ports(honeypots) to open to the internet which are utilized by your environment. Based on the amount of attacks hitting that specific honeypot, we can harden our systems and services to make it harder for hackers to penetrate. Think of it as a check engine light on your car, if it lights up you still have some time to drive but should get it investigated soon by a professional.
Setting up GCP VM:
Compute Engine --> VM instance Template -> Select the Debian Buster 10 VM
VPC Network—>Firewall rules—>Create a Firewall Rule
Create a name
Under Targets select "All Instances in the network"
Under Source IP select - 0.0.0.0/0
Protocols and ports - Allow all
Setting up the T-pot:
Launch SSH in GCP platform
sudo apt-get update && apt-get upgrade
sudo install git -y
git clone https://github.com/dtag-dev-sec/tpotce.git
go into the tpotce folder and run the command sudo ./install.sh –type=user
Select STANDARD(or whichever option suits your business needs but standard should work for all)

Set the Username and Password when prompted and the VM is set!
Access via:
Web portal - https://<external GCP IP address>:64297
Management portal - https://<external GCP IP address>:64294
Comments