Oct. 1, 2023, 6:26 p.m. | Gowthamaraj Rajendran (@fuffsec)

InfoSec Write-ups - Medium infosecwriteups.com

Source

It was a typical Saturday evening. I was sipping my coffee, scrolling through some logs on my Newly deployed Honeypot when a peculiar pattern caught my eye. My honeypot, designed to be the digital flytrap for hackers, was full of alerts just after being deployed.

My Brain: Did my honeypot attract a hacker or was it just a bot?

Join me as I unravel this digital mystery, step by step, byte by byte.

How I created this infrastructure

  1. Create …

cybersecurity hacking honeypot infosec security

Humbly Confident Security Lead

@ YNAB | Remote

Information Technology Specialist II: Information Security Engineer

@ WBCP, Inc. | Pasadena, CA.

Director of the Air Force Cyber Technical Center of Excellence (CyTCoE)

@ Air Force Institute of Technology | Dayton, OH, USA

Senior Cyber Security Analyst

@ Valley Water | San Jose, CA

Cybersecurity Subject Matter Expert

@ QinetiQ US | Washington, DC, United States

Program Cybersecurity Manage (F/M/X)

@ Alstom | Villeurbanne, FR