Big thank you to Cisco for sponsoring this video and sponsoring my trip to Cisco Live San Diego. This video features David Bombal and Kyle Winters demonstrating practical cybersecurity techniques. Kyle walks through how to use Hydra to brute force SSH passwords, explaining the process of leveraging wordlists and optimizing the attack. Following the offensive demonstration, Kyle transitions into defensive measures, showing viewers how to quickly and easily set up an SSH honeypot using Cowrie. The honeypot serves as a decoy to attract and monitor malicious actors attempting to access a network. The demonstration includes setting up the honeypot on an Ubuntu host, configuring IP tables for port redirection, and monitoring logs for incoming connection attempts. The video highlights the importance of understanding both attack methods and defensive strategies in cybersecurity. Kyle also mentions free ethical hacking training resources available through Cisco Networking Academy ( ) and future tutorials on Cisco U ( ). // COMMANDS // Devices: client server ubuntu-honeypot Nmap scan: nmap -sn Verify Hydra installed: hydra -h Show wordlists: ls -al /usr/share/wordlists/ Crack with known username: hydra -l admin -P /usr/share/wordlists/ -t 4 -f ssh:// Crack with unknown username: hydra -L /usr/share/wordlists/ -P /usr/share/wordlists/ -t 4 -f ssh:// Create dir for Cowrie: mkdir cowrie cd cowrie/ Clone cowrie: git clone . Launch the python virtual environment: python3 -m venv cowrie-env source cowrie-env/bin/activate Install python requirements: pip install --upgrade pip pip install -r Copy and edit the config: cp etc/ etc/ vi etc/ Setup port forwarding for SSH to Cowrie: sudo iptables -t nat -A PREROUTING -p tcp --dport 22 -j REDIRECT --to-port 2222 sudo iptables-save Start Cowrie: bin/cowrie start Check Cowrie status: bin/cowrie status View logs: tail -f var/log/cowrie/ // MENU // 0:00 – Introduction 0:23 – Cisco Modeling Labs (CML) Demo 01:10 – Alpine Linux & Hydra 04:37 – Network Topology 05:37 – Honeypot Setup 06:24 – Exploring the CML Sandbox 08:39 – Configuring Traffic Redirection 10:42 – Simulating Malicious Access to the Honeypot 10:58 – Free Ethical Hacking Course 12:03 – Final Thoughts 12:20 – Outro // Kyle Winter’s SOCIALS // Socials: Cisco Blogs: // Website REFERENCE // // David's SOCIAL // Discord: X: Instagram: LinkedIn: Facebook: TikTok: @davidbombal YouTube: @davidbombal Spotify: SoundCloud: Apple Podcast: // MY STUFF // // SPONSORS // Interested in sponsoring my videos? Reach out to my team here: sponsors@ Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel! Disclaimer: This video is for educational purposes only. Hack SSH: Crack Passwords, Deploy Honeypots Fast Crack SSH Passwords Easily Using Hydra + Wordlists Brute Force SSH & Build a Honeypot Now Crack SSH Passwords, Stop Hackers with Honeypots Build a Live SSH Honeypot in Minutes Hydra in Action: SSH Password Cracking Demo Cybersecurity Lab: Hack SSH, Defend with Honeypots SSH Hacking: Crack Passwords, Setup Honeypots Hydra + Cowrie: SSH Attack & Defense Guide #ssh #hacker #hack











