top of page

A Beginner's Tale of Honeypots

Introduction You may have come across the term honeypot either when studying or working in the cyber security industry. What is a...

Kippo – A SSH Honeypot (Updated)

Update Note Cowrie – a (relatively) new SSH honeypot – has been my obsession for the week. I took a quick first glimpse at Cowrie, and I...

Thug – A Client Honeypot

Introduction to Thug & Client Honeypot Client honeypots are amazing tools for security practitioners who wish to perform a quick analysis...

Who's Really Attacking Your ICS?

Attackers are actively targeting Internet-connected industrial control systems (ICS) according to data collected from a global network of...

Honeytrap

Honeytrap, written by Tillmann Werner, is a low-interaction malware collection honeypot. Unlike the classic approach of emulating...

Tiny Honeypot (THP)

Tiny Honeypot (THP) is probably the easiest low-interaction honeypot I’ve deployed, and it produced a reasonable amount of results from...

BLOG: Blog2
bottom of page