From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Unlock the full course today

Join today to access over 22,400 courses taught by industry experts or purchase this course individually.

Run the Cowrie honeypot

Run the Cowrie honeypot

From the course: Ethical Hacking: Evading IDS, Firewalls, and Honeypots

Start my 1-month free trial

Run the Cowrie honeypot

- [Instructor] I've made a clone of my Ubuntu system and run APT Get update and APT Get upgrade to get it up to date. Installing Cowrie is fairly straightforward, although there are some dependency issues that you might encounter. We'll start by installing the main library dependencies. Okay, we're now ready to go. If the start script complains of missing dependencies in your Ubuntu configuration, then find the libraries and install them. Okay, we've started. I'll go into my Cowrie system and see what I can see. Just before I do that, I'll check my IP address. Right, we're on 10.0.2.19. Let's nmap the server. Okay, we can see port 22 is open and somewhat incriminating port 8022. Let's try to log into port 22. I'll guess the password. And we get in. In fact, Cowrie allows any password, other than those explicitly excluded in its data/userdb.text file. By default root and 123456 are excluded, anything else is allowed. You can configure this to be as open or as restrictive as you like…

Contents