Here is a demonstration video I made for this lab:
Setup a honeypot virtual machine that is wide exposed to the internet (zero-inbound rules)
A honeypot is a computer with weak security.
Just like how honey bees are attracted to honey, we can attract hackers from around the world to try to hack into our computer.
Hackers love weakly configured computers. And unlike bees, hackers use automated tools to find goodies
Analyze incoming traffic