Overview of IoT threats in 2023
IoT threats: how devices get hacked, what malware is uploaded, and what services are on offer on the dark web in 2023. Continue reading Overview of IoT threats in 2023
Collaborate Disseminate
IoT threats: how devices get hacked, what malware is uploaded, and what services are on offer on the dark web in 2023. Continue reading Overview of IoT threats in 2023
I want to collect IoT botnets in order to analyze them. Are there any good VPS providers who allow to do that? – I’m a little cautious about this because of possible misconfigurations that could trigger a lifetime ban. I’m especially looki… Continue reading Hosting a Honeypot to collect data
I have deployed a low-interaction honeypot on my ec2 aws instance but I am not receiving any traffic. Where can I share the URL so that I can get more traffic especially from automated bots.
I’m installing SecurityOnion Intrusion Detection Honeypot. Does NMAP recognise it as CentOS7 or it might give a hint to the hacker that it is a security onion machine build?
Does SecurityOnion have its own fingerprints?
I am new to machine learning and I was trying to build a simple model which shall distinguish (classify between) between an IoT honeypot and a regular (non-IoT) honeypot node e.g is the honeypot running on an x86 laptop or a router? I have… Continue reading Regular (non-iot) honeypot vs IoT honeypot [closed]
I would like to ask for some tips and your own experience. I want to try build some low-interactive honeypot, but I don’t know how many services should I run on it or what is suitable to have on this server.
It is better to have only few s… Continue reading Low interactive honeypot – how many fake services should i use
I have a ZTE (F670L) router for my home network. Since past few days, I have been observing SSL certificate error (NET::ERR_CERT_AUTHORITY_INVALID), occurring abruptly more frequently than before. This initially started happening with Fire… Continue reading Is my router/network compromised? [migrated]
Is there a honey pot that displays a fake desktop environment, file system etc, for physical attackers?
Out of curiosity I want my email address to receive as much spam as possible.
For this, I have already set up a virtual machine, with a Postfix that has a catch-all user, so I receive every email to my domain.
These are the things I have d… Continue reading Receive more spam emails [duplicate]
I am trying to set up a honeypot service on the network and I installed dionaea honeypot. I figured out that each service is being controlled by yaml files present in /opt/dionaea/etc/dionaea/services-available.
The way defaults work is al… Continue reading How to write separate log files for separate services in dionaea honeypot