Watching the Bad Guys with Cowrie

Honeypots

Photo by Christina Branco on Unsplash

Photo by Christina Branco on Unsplash

Author(s):

Use Cowrie as a honeypot to capture attack data and learn more about your attacker's methods.

Special Thanks: This article was made possible by support from Linux Professional Institute

For one reason or another, I stumbled across a relatively old piece of software the other day while researching some unrelated DevOps security news. Doing so reminded me that I hadn’t run a honeypot for around fifteen years, and it inspired me to see if there were any advances in honeypot functionality.

There are three key types of honeypots, which fall into categories base on interactivity:

[...]

Use Express-Checkout link below to read the full article (PDF).

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

comments powered by Disqus
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters

Support Our Work

Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.

Learn More

News