A Beginner's Tale of Honeypots
Introduction You may have come across the term honeypot either when studying or working in the cyber security industry. What is a...
Introduction You may have come across the term honeypot either when studying or working in the cyber security industry. What is a...
Note: This is an add-on post on top of my Kippo write-up. Kippo2MySQL Kippo2MySQL is a simple piece of script that extracts some very...
Quite a lot of people whom I’m following on Twitter were talking about the release of MazeRunner Community Edition, so I decided to check...
Update Note Cowrie – a (relatively) new SSH honeypot – has been my obsession for the week. I took a quick first glimpse at Cowrie, and I...
Cowrie – written by Michel Oosterhof – is a medium interaction SSH honeypot designed to log brute force attacks and shell interactions...
According to SANS Top Cyber Security Risks (Jul, 2010), attacks against Web applications make up more than 60% of the total number of...
Introduction to Dionaea Dionaea “the Nepenthes successor” is a malware capturing honeypot initially developed under The Honeynet...
Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...
Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...
Honeytrap, written by Tillmann Werner, is a low-interaction malware collection honeypot. Unlike the classic approach of emulating...
Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...