top of page


Honeypots are system that are designed to appear vulnerable in order to tempt hackers to exploit them. Honeypots can be used to divert attackers from your valuable assets and systems, study attackers and their techniques or capture their malware.


Check out my article on setting up Dionaea, a honeypot designed to capture malware here  and configuring

Dionaea here.


In addition, we build a Honeypot specific to SCADA/ICS systems in this article.

bottom of page