Watching the Bad Guys with Cowrie
Honeypots

Photo by Christina Branco on Unsplash
Use Cowrie as a honeypot to capture attack data and learn more about your attacker's methods.
Special Thanks: This article was made possible by support from Linux Professional Institute
For one reason or another, I stumbled across a relatively old piece of software the other day while researching some unrelated DevOps security news. Doing so reminded me that I hadn’t run a honeypot for around fifteen years, and it inspired me to see if there were any advances in honeypot functionality.
There are three key types of honeypots, which fall into categories base on interactivity:
[...]