Catching Threat Actors using honeypots! (Part 2)

Ohayo!

I am very happy to share the second part of my honeypot research today!

https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part2)//)

In this part, we will finally take a look at some data generated by the honeypots. The focus will mainly be on Cowrie data.

I also decided to share the malware samples I collected so far. If you are interested in downloading it, you can find it on my discord.

Feel free to ask questions and critique the post. I am aware that these heavy number crunching/technical posts can be hard to digest. Please let me know if you have any ideas to improve the entertainment factor of such posts :-)

If you'd like to support my research work, you can buy me a virtual coffee here. You can also join my Discord to talk about CyberSec with me!

Cheers :)

submitted by /u/TachiPy
[link] [comments]

from hacking: security in practice https://ift.tt/EKXlGP2

Comments