HoneyTrap Logs

HoneyTraps in the Cloud 101

Updated 2021-03-01: Give the reader a heads up that restarting SSH will kick them from their current session. Overview Honeypots are useful tools for collecting unauthorized interactions as logs. These logs can be digested to identify new attacking techniques or observe active username/password patterns. In the context of a security team, it could provide actionable information to pre-emptively secure the studied environment. This tutorial will discuss general SSH honeypot pre-configuration, HoneyTrap installation, logging, and analysis....

January 25, 2021 · 5 min