t-Pot: Honeypot Platform

Hi, in a previous post we created and configured the Cowrie SSH honeypot. A simple, easy and quick way to gather information, malicious IPs, uncover C2 servers, collect downloaded files, executables and scripts associated with cryptominers, reverse shells, DDoS attacks and much more. However, SSH is just one of the many services that attackers might… Continue reading t-Pot: Honeypot Platform

Cowrie: SSH Honeypot

Hi, if you are reading this you probably already know what a honeypot is, so I will skip the intro and get straight to the interesting part. However if you don’t know what a honeypot is you can read this great post by imperva. I will walk you through a fairly easy setup and by… Continue reading Cowrie: SSH Honeypot