You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Any possibility of merging the following python code with the Cowrie docker container as an option for use with T-Pot in order to randomize the configuration of the SSH/Telnet honeypot?
The following python script will generate a random host profile with new users, hostname, groups, file shares, harddrive(s) sizes, mounts, CPU, RAM, OS version, IP address, MAC addresses and SSH version.
In theory, this would make Cowrie honeypots much harder to detect and more attractive to attackers compared to the default Cowrie honeypot configuration.
Is anybody interested in assisting in working on this?
reacted with thumbs up emoji reacted with thumbs down emoji reacted with laugh emoji reacted with hooray emoji reacted with confused emoji reacted with heart emoji reacted with rocket emoji reacted with eyes emoji
-
Any possibility of merging the following python code with the Cowrie docker container as an option for use with T-Pot in order to randomize the configuration of the SSH/Telnet honeypot?
The following python script will generate a random host profile with new users, hostname, groups, file shares, harddrive(s) sizes, mounts, CPU, RAM, OS version, IP address, MAC addresses and SSH version.
In theory, this would make Cowrie honeypots much harder to detect and more attractive to attackers compared to the default Cowrie honeypot configuration.
Is anybody interested in assisting in working on this?
https://github.com/luftl0ch/cowrie-obscurer
Beta Was this translation helpful? Give feedback.
All reactions