Cowrie - Setting up a Honeypot environment (Part 1)

1. Introduction A Honeypots function could be considered consistent with its name, it is designed to attract malicious traffic, it does this by emulating services that would be considered valuable for malicious attackers. When a bad actor tries to establish a connection with the service running on the honeypot, the connection will be logged and made available for…