If you wanna try it, you need to installPsyco, a python light library . Take it from apt-get or if you're using OS X from port just typing :
sudo port install py25-psyco
After that, edit
At least you need to add the external ip address to use, and the vulnerabilities to emulate. A new feature with Amun 0.1.2 is auto-submission to Anubis, an online malware sandbox; if you don't like Anubis remove the entry from config file as following.
Save the amun.conf, start ./amun_server.py, and here we go . An easy honeypot has been installed on your local machine.
Another great Amun features is the possibility to write a "Vulnerability's plugin" using a XML file, so no particular python language skills are needed. Under the ./utils/xml_vuln_creator folder you'll find a "Creator": vuln_creator.py, able to convert a xml file to a vulnerability module. Let me show a very famous example: the VNC vulnerability.
From the source :
typing :
./vuln_creator.py -f xml_vnc.xml
You'll build two files to add into the folder
Again, we've just finished to build our own vulnerability's module, and our honeypot has a new feature: "The VNC Vulnerability". Everything thanks to XML technologies and Python language' s union. So far the honeypot configuration was very stressfull, right now it's going to be an easy installation process.
Thanks to RWTHAACHEN University for that.