Ladies and Gentleman, I present to you – YET ANOTHER USE FOR A PI!

The HoneyPi – a easy target for hackers that keeps them busy while logging away.


Once HoneyPi is configured I used methods covered in the following link to pull out psad messages from syslog in a separate file, then I can just stop by a grab the pi at some point in the future and pull the logs: Using PSAD and Logstash · GitHub

Set up on my home network, it seemed to capture all my door knocking… Now to test at work.

Leave a Reply

You can use these HTML tags

<a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <s> <strike> <strong>