Ohayo!
I am very happy to share the second part of my honeypot research today!
https://burningmalware.com/Catching-Threat-Actors-using-honeypots!-(Part2)//)
In this part, we will finally take a look at some data generated by the honeypots. The focus will mainly be on Cowrie data.
I also decided to share the malware samples I collected so far. If you are interested in downloading it, you can find it on my discord.
Feel free to ask questions and critique the post. I am aware that these heavy number crunching/technical posts can be hard to digest. Please let me know if you have any ideas to improve the entertainment factor of such posts :-)
If you'd like to support my research work, you can buy me a virtual coffee here. You can also join my Discord to talk about CyberSec with me!
Cheers :)
[link] [comments]
from hacking: security in practice https://ift.tt/EKXlGP2
Comments
Post a Comment