In this report, we outline in detail the goals of our project, our methodology, the setup of the honeypot environment and the execution of all the attacks, the results and prevention techniques for each attack, and then connect our findings to existing research. Our individual contributions to the project are also highlighted at the end of the report.Â