Watching the Bad Guys with Cowrie

This Is the End

There are a number of uses for clever tools like Cowrie. Hopefully, you can see the value of honeypots, whether it be for security research or as an early warning tool on a LAN.

In the past, I’ve used honeypots to be more active at denying access to external resources for a short period of time (rate limiting essentially), so that after a few alerts a human could figure out if the issue was serious or a misconfiguration somewhere.

If you’re more interested in malware detection, then I also suggest a sophisticated malware-catching honeypot called Dionaea, which looks readily maintained on GitHub with commits of only about a month old. Dionaea uses libemu to detect shellcodes and supports Ipv6 and TLS. If Dionaea appears complex, then fret not as the documentation looks excellent.

I’ll leave you to decide your software preference as a few are available. I trust you to find an ISP or host that allows you to run honeypots responsibly and then to find a way to put them to good use.

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Honeypots for the Pi

    Adding a honeypot to your network will slow down attackers and warn you that intruders are on the wire.

  • Honeynet

    Security-conscious admins can use a honeynet to monitor, log, and analyze intrusion techniques.

  • Docker with OwnCloud

    Run your application smoothly and portably in the cloud with the Docker container system. This workshop takes a practical look deploying Docker with the OwnCloud cloud environment.

  • Docker

    Docker is an economical alternative to conventional virtualization. Because each Docker container shares the underlying operating system, it enjoys the resource isolation and allocation benefits of VMs but is much more portable and efficient.

  • Container Security

    A recent flurry of activity in the container space raises several interesting questions about security among a number of operational aspects in the enterprise environment.

comments powered by Disqus

Direct Download

Read full article as PDF:

News