<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Honeypot on Linux Security</title><link>/tags/honeypot/</link><description>Recent content in Honeypot on Linux Security</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 23 Oct 2024 00:00:00 +0000</lastBuildDate><atom:link href="/tags/honeypot/index.xml" rel="self" type="application/rss+xml"/><item><title>Cowrie</title><link>/post/cowrie/</link><pubDate>Wed, 23 Oct 2024 00:00:00 +0000</pubDate><guid>/post/cowrie/</guid><description>Cowrie is an open-source SSH and Telnet honeypot designed to mimic a vulnerable system and log attacker activities. Originally based on Kippo, Cowrie has evolved into a robust tool for cybersecurity research and monitoring. It allows organizations to collect valuable data on malicious activities, helping them strengthen their defenses against real-world threats. You can learn more about Cowrie and contribute to its development on its GitHub page.
Key Features of Cowrie Emulation of SSH and Telnet Services Cowrie emulates SSH and Telnet protocols, attracting attackers attempting to gain unauthorized access.</description></item><item><title>Honeypots</title><link>/post/honeypots/</link><pubDate>Fri, 23 Aug 2024 00:00:00 +0000</pubDate><guid>/post/honeypots/</guid><description>Honeypots in Computer Security Honeypots are important tools in computer security that can help organizations detect and respond to attacks. A honeypot is a system or network that is designed to look like a real target, but is actually used to monitor and analyze attacks. Honeypots can be used to gain insight into attackers&amp;rsquo; tactics, techniques, and procedures, and can help organizations improve their security posture.
Detection of Attacks One of the key benefits of honeypots is that they allow organizations to detect attacks that might otherwise go unnoticed.</description></item><item><title>OpenCanary</title><link>/post/opencanary/</link><pubDate>Tue, 23 Apr 2024 00:00:00 +0000</pubDate><guid>/post/opencanary/</guid><description>OpenCanary is a versatile, open-source network honeypot designed to detect malicious activity within networks. Created by Thinkst, it emulates various services to attract potential attackers and logs their activities, helping organizations identify and respond to threats in real-time. OpenCanary is lightweight, configurable, and an essential tool for security professionals aiming to enhance their network defenses.
Key Features of OpenCanary Multi-Protocol Support OpenCanary supports a wide range of protocols, including but not limited to:</description></item></channel></rss>