Dshield Pi honeypot
Nov 17, 2020
4 minutes
Baiting attackers towards your own hardware might not seem a particularly good idea, but if that hardware has nothing of value on to it, and is suitably isolated from your other machines that do, then you can more or less lure them in with impunity. The goal of setting up a honeypot is not to revenge hack attackers, but rather to detect attacks, and distract those responsible from more valuable targets.
Opening your home network up to the internet isn’t something that should be done lightly though. If the honeypot machine were to be compromised, then it could be used a staging post for attacking any services running on your network, including
You’re reading a preview, subscribe to read more.
Start your free 30 days