top of page
Honeypots are system that are designed to appear vulnerable in order to tempt hackers to exploit them. Honeypots can be used to divert attackers from your valuable assets and systems, study attackers and their techniques or capture their malware.
Check out my article on setting up Dionaea, a honeypot designed to capture malware here and configuring
In addition, we build a Honeypot specific to SCADA/ICS systems in this article.
bottom of page