top of page

A Beginner's Tale of Honeypots

Introduction You may have come across the term honeypot either when studying or working in the cyber security industry. What is a...

Cymmetria's MazeRunner (A Quick Look)

Quite a lot of people whom I’m following on Twitter were talking about the release of MazeRunner Community Edition, so I decided to check...

Kippo – A SSH Honeypot (Updated)

Update Note Cowrie – a (relatively) new SSH honeypot – has been my obsession for the week. I took a quick first glimpse at Cowrie, and I...

Thug – A Client Honeypot

Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...

Who's Really Attacking Your ICS?

Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...

Honeytrap

Honeytrap, written by Tillmann Werner, is a low-interaction malware collection honeypot. Unlike the classic approach of emulating...

Tiny Honeypot (THP)

Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...

BLOG: Blog2
bottom of page