Incident Response & Forensics

Honeypot

About 3 min read

What Is a Honeypot

A honeypot is a decoy system intentionally set up to attract attackers. It exposes servers or services that are not used for legitimate business operations and records and analyzes attacker behavior when they access it.

Since there is no legitimate access to a honeypot, all access can be treated as malicious activity. This characteristic enables high-accuracy detection of unknown attack techniques and attacker reconnaissance activities that are difficult for firewalls and IDS to detect. The collected information is used as threat intelligence to improve defensive strategies.

Types of Honeypots and Interaction Levels

  • Low-Interaction Honeypots: Emulate services such as SSH, HTTP, and SMB, recording source IPs and login attempt passwords. Easy to build and operate, suitable for mass deployment to observe internet-wide attack trends. Cowrie and Dionaea are representative tools
  • High-Interaction Honeypots: Run actual operating systems and applications, convincing attackers they are interacting with real systems. Can record in detail the malware attackers upload and lateral movement techniques, but carry the risk of being compromised, requiring strict network isolation and monitoring
  • Honeynets: Configure multiple honeypots as a network to observe attacker lateral movement. By mimicking an internal corporate network, you can understand attacker behavior patterns all the way to their ultimate objectives

Leveraging Honeypots as Threat Intelligence

Data obtained from honeypots becomes practical intelligence that strengthens your organization's defenses.

  • Collecting Attacker IPs: Automatically register IP addresses that access the honeypot into SIEM blocklists to proactively prevent attacks on production environments
  • Analyzing Attack Techniques: Analyze exploits and malware used, and verify whether your organization's systems have the same vulnerabilities
  • Understanding Credential Trends: Analyze trends in usernames and passwords attempted during brute-force attacks to improve password policies
  • Detecting Internal Threats: Deploy honeypots on the internal network to detect access to systems that legitimate users should never touch. This functions as an early trigger for incident response

How to Build Honeypots and Representative Tools

Select honeypot tools based on your objectives and operational capacity.

Cowrie is a low-interaction honeypot specializing in SSH and Telnet. It records all commands entered by attackers and presents a fake file system. Particularly effective for collecting password dictionaries used in brute-force attacks, it can be launched with a single docker run command using the published Docker image.

Dionaea emulates numerous protocols including SMB, HTTP, FTP, and MSSQL, with strengths in automated malware collection. It automatically saves binaries sent by attackers and can integrate with external services like VirusTotal for analysis.

T-Pot is an all-in-one platform integrating multiple honeypots including Cowrie, Dionaea, and Honeytrap. It comes with an Elasticsearch + Kibana dashboard for real-time visualization of attack source geographic distribution and temporal attack trends. Simply installing from an ISO image on a cloud VM runs over 20 types of honeypots simultaneously.

A key point during setup is that honeypots must be placed in a network segment separate from the production environment, and outbound communication from the honeypot must be strictly restricted. To prevent attackers from using the honeypot as a pivot to attack other systems, the standard practice is to limit outbound traffic to log forwarding destinations only.

Operational Considerations and Risks

Operating honeypots requires not only technical but also legal and organizational considerations.

As a legal risk, if a honeypot is used as a stepping stone by an attacker, you may be held responsible for attacks originating from it. While setting up honeypots is not illegal under Japan's Unauthorized Computer Access Law, you should clarify the relationship between the act of "luring" attackers and law enforcement investigation methods, as well as data handling under privacy laws. Obtaining prior confirmation from your organization's security policy and legal department is recommended.

Thorough network isolation is the most important technical requirement. Since attackers may gain root privileges on high-interaction honeypots, block all communication from the honeypot segment to the production segment using VLAN isolation plus firewall rules. In cloud environments, creating a dedicated VPC without peering provides reliable physical isolation.

The risk of attacker pivoting should not be overlooked. Cases have been reported where attackers who compromised high-interaction honeypots used them as a base to scan other organizational systems or launch DDoS attacks externally. Always configure outbound traffic monitoring and alerts for abnormal traffic volumes.

Maintenance overhead is also a practical concern. If honeypot software is not kept up to date, attackers can identify it as a honeypot. High-interaction types in particular require ongoing OS patching, service version management, and log storage capacity monitoring. If the operations team cannot allocate sufficient resources, starting with low-interaction types and gradually expanding is a realistic approach.

To learn more about this topic, see Firewall Basics: Your First Line of Network Defense.

Common Misconceptions

Setting up a honeypot invites attackers into your corporate network, making it dangerous
A properly isolated honeypot is completely separated from the production environment. The premise is a design where VLAN and firewall rules block communication from the honeypot to the production environment, preventing attackers from using the honeypot as a pivot.
Honeypots cannot be operated without an advanced security team
Low-interaction honeypots can be built in minutes with Docker containers, and basic operation is possible simply by forwarding logs to a SIEM. Using an all-in-one platform like T-Pot, you can easily deploy including a visualization dashboard.

Low-Interaction vs. High-Interaction Honeypots

Low-Interaction

Only emulates services without running an actual OS. Easy to build and suitable for mass deployment. Strong at observing early attack stages (scanning, login attempts) but cannot record deep attacker behavior.

High-Interaction

Runs actual OS and applications. Can record attacker malware deployment and privilege escalation techniques in detail, but carries compromise risk and requires strict network isolation and constant monitoring.

Share

Related Terms

Related Articles