WhatsApp at (+91-9098855509) Support
ijprems Logo
  • Home
  • About Us
    • Editor Vision
    • Editorial Board
    • Privacy Policy
    • Terms & Conditions
    • Publication Ethics
    • Peer Review Process
  • For Authors
    • Publication Process(up)
    • Submit Paper Online
    • Pay Publication Fee
    • Track Paper
    • Copyright Form
    • Paper Format
    • Topics
  • Fees
  • Indexing
  • Conference
  • Contact
  • Archieves
    • Current Issue
    • Past Issue
  • More
    • FAQs
    • Join As Reviewer
  • Submit Paper

Recent Papers

Dedicated to advancing knowledge through rigorous research and scholarly publication

  1. Home
  2. Recent Papers

Honeypott3r: An Open-Source Multi-Layered Security Analysis Framework for Honeypot Vulnerability Assessment

Ayushman Bilas Thakur Bilas Thakur

DOI: 10.58257/IJPREMS39220
Download Paper

Paper Contents

Abstract

Honeypots are deceptive security mechanisms designed to attract, detect, and analyze cyber threats by mimicking real systems. They are widely used in cybersecurity research and defense strategies to study attack patterns and adversary techniques. However, if not configured properly honeypots can be easily detected, making them potential targets for attackers to gain access to the main server. This paper introduces Honeypott3r, an open-source, multi-layered security analysis framework designed to systematically assess the security of honeypots. The framework focuses on SSH and HTTP-based honeypots, specifically Cowrie, Conpot, and Wordpot, which are deployed in Docker containers on AWS EC2 (Debian). Honeypott3r performs detection, log evasion, privilege escalation, reverse exploitation, and denial-of-service (DoS) simulations, leveraging tools like Trivy, Bandit, Safety-CLI, Nmap, Nikto, and WPScan. It also searches for Metasploit modules to identify potential exploits. The collected data is stored in MongoDB and visualized through an interactive dashboard for further analysis. The results reveal various weaknesses in honeypots, highlighting the need for improved deception techniques. This research contributes to the cybersecurity community by providing a structured approach to honeypot vulnerability assessment, helping defenders enhance their security posture and mitigate risks more effectively.Keywords: Honeypots, Cowrie, Conpot, Wordpot, Vulnerability Assessment

Copyright

Copyright © 2025 Ayushman Bilas Thakur. This is an open access article distributed under the Creative Commons Attribution License.

Paper Details
Paper ID: IJPREMS50300045668
ISSN: 2321-9653
Publisher: ijprems
Page Navigation
  • Abstract
  • Copyright
About IJPREMS

The International Journal of Progressive Research in Engineering, Management and Science is a peer-reviewed, open access journal that publishes original research articles in engineering, management, and applied sciences.

Quick Links
  • Home
  • About Our Journal
  • Editorial Board
  • Publication Ethics
Contact Us
  • IJPREMS - International Journal of Progressive Research in Engineering Management and Science, motinagar, ujjain, Madhya Pradesh., india
  • Chat with us on WhatsApp: +91 909-885-5509
  • Email us: editor@ijprems.com
  • Sun-Sat: 9:00 AM - 9:00 PM

© 2025 International Journal of Progressive Research in Engineering, Management and Science. All Rights Reserved.

Terms & Conditions | Privacy Policy | Publication Ethics | Peer Review Process | Contact Us