From 4f7d1b4e7e0383ea78f408d9f7248acac8d56826 Mon Sep 17 00:00:00 2001
From: Domenico Del Giudice <114437746+domedg@users.noreply.github.com>
Date: Sun, 2 Mar 2025 13:25:31 +0100
Subject: [PATCH] Update README.md
---
README.md | 54 ++++++++++++++++++++++++++++++++++++++++++++++++++++--
1 file changed, 52 insertions(+), 2 deletions(-)
diff --git a/README.md b/README.md
index 28001ce1..51e6fd9c 100644
--- a/README.md
+++ b/README.md
@@ -308,8 +308,58 @@ These errors are not critical and T-Pot should still function correctly.
---
-### 2.3 Testing 🦠
-Section testing
+### 2.3 Testing (ConPot)🦠
+
+In this section, we will perform tests on the Conpot honeypot, as mentioned in section [1.3.1 Industrial and Medical Honeypots 🏭](#1.3.1-industrial-and-medical-honeypots).
+
+1. **[Conpot](http://conpot.org/)**: Simulates Industrial Control Systems (ICS) and protocols like Modbus, SNMP, and S7comm.
+
+**Verify if Conpot exposes the expected services (e.g., port 80 for HTTP, port 502 for Modbus, port 161 for SNMP):**
+
+```sh
+nmap -sV -p 1-65535
+
+nmap -sS -p- 127.0.0.1 # TCP SYN scan (all ports)
+nmap -sU -p- 127.0.0.1 # UDP scan (all ports)
+nmap -sV 127.0.0.1 # Service version detection
+```
+
+**Brute force attack examples using Hydra:**
+
+```sh
+hydra -l -P ssh://127.0.0.1
+hydra -l -P ftp://127.0.0.1
+hydra -l -P http-get://127.0.0.1
+```
+
+**Exploitation example using Metasploit:**
+
+```sh
+msfconsole
+use exploit/linux/ssh/sshexec
+set RHOST 127.0.0.1
+set USERNAME
+set PASSWORD
+exploit
+```
+
+**Example of an XSS attack using curl:**
+
+```sh
+curl -X POST -d "username=" http://127.0.0.1/login
+```
+
+**SQL injection example using sqlmap:**
+
+```sh
+sqlmap -u "http://127.0.0.1/page?id=1" --risk=3 --level=5
+```
+
+**Netcat example to connect to port 80 (HTTP):**
+
+```sh
+nc -v 127.0.0.1 80
+```
---