Implementing an open source honeypot platform
In this section, you will learn how to implement an open source honeypot on a network. The purpose of a honeypot is to trick an attacker into thinking they are attacking a real system on a target network. However, the honeypot is a specialized system that contains various security detection, monitoring, and deflection tools that are used to help cybersecurity professionals better understand the intentions of the attacker.
You will learn how to implement T-Pot, an open source honeypot platform that contains a suite of threat detection and analysis tools, such as these:
- Elastic Stack (ELK): ELK provides a visualization of all the threats detected by the honeypot.
- Spiderfoot: This application allows a security professional to automate Open Source Intelligence (OSINT).
- Suricata: Suricata is an open source network and security intrusion detection engine.
- CyberChef: This is a web application for encoding, encryption,...