From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Unlock the full course today
Join today to access over 22,400 courses taught by industry experts or purchase this course individually.
Run the Cowrie honeypot
From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots
Run the Cowrie honeypot
- [Instructor] I've made a clone of my Ubuntu system and run APT Get update and APT Get upgrade to get it up to date. Installing Cowrie is fairly straightforward, although there are some dependency issues that you might encounter. We'll start by installing the main library dependencies. Okay, we're now ready to go. If the start script complains of missing dependencies in your Ubuntu configuration, then find the libraries and install them. Okay, we've started. I'll go into my Cowrie system and see what I can see. Just before I do that, I'll check my IP address. Right, we're on 10.0.2.19. Let's nmap the server. Okay, we can see port 22 is open and somewhat incriminating port 8022. Let's try to log into port 22. I'll guess the password. And we get in. In fact, Cowrie allows any password, other than those explicitly excluded in its data/userdb.text file. By default root and 123456 are excluded, anything else is allowed. You can configure this to be as open or as restrictive as you like…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.