Set Up a Secure Shell Honeypot
Aug 20, 2019
4 minutes
–ALEX COX
YOU’LL NEED THIS
A RASPBERRY PI
Version 2 or better.
RASPBIAN BUSTER
The latest spin on the Pi OS.
COWRIE
A great honeypot (see https://github.com/cowrie).
actual paid hackers on some Chinese payroll, or zombie computers compromised by malware, there’s a huge number of forces trying to sniff around your network. A quick browse of your router’s firewall logs (or those of Windows’ own second-line-of-defense firewall) will likely make for worrying reading: Your ports are probably being scanned, probed, and poked to within an inch of their lives. There’s little you can do, save for sleuthing out the snoopers and stopping them in real life (something we don’t endorse). Instead, how about taking the
You’re reading a preview, subscribe to read more.
Start your free 30 days