How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks

This project documents the deployment of a Cowrie honeypot on Ubuntu to capture and analyze real-time SSH intrusion behavior. From setting up port forwarding to logging attacker actions and mapping them to MITRE ATT&CK techniques, the piece walks throu…


This content originally appeared on HackerNoon and was authored by AuthenticPeach

This project documents the deployment of a Cowrie honeypot on Ubuntu to capture and analyze real-time SSH intrusion behavior. From setting up port forwarding to logging attacker actions and mapping them to MITRE ATT&CK techniques, the piece walks through each stage of the attack lifecycle—from initial enumeration to attempted persistence and evasion. Using Python, regex, and data visualizations, the article serves as a practical cybersecurity lab and an ideal portfolio project for aspiring threat hunters and SOC analysts.


This content originally appeared on HackerNoon and was authored by AuthenticPeach


Print Share Comment Cite Upload Translate Updates
APA

AuthenticPeach | Sciencx (2025-08-01T13:04:20+00:00) How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks. Retrieved from https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/

MLA
" » How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks." AuthenticPeach | Sciencx - Friday August 1, 2025, https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/
HARVARD
AuthenticPeach | Sciencx Friday August 1, 2025 » How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks., viewed ,<https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/>
VANCOUVER
AuthenticPeach | Sciencx - » How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks. [Internet]. [Accessed ]. Available from: https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/
CHICAGO
" » How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks." AuthenticPeach | Sciencx - Accessed . https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/
IEEE
" » How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks." AuthenticPeach | Sciencx [Online]. Available: https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/. [Accessed: ]
rf:citation
» How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks | AuthenticPeach | Sciencx | https://www.scien.cx/2025/08/01/how-i-set-up-a-cowrie-honeypot-to-capture-real-ssh-attacks/ |

Please log in to upload a file.




There are no updates yet.
Click the Upload button above to add an update.

You must be logged in to translate posts. Please log in or register.