{"id":862,"date":"2024-12-30T07:15:30","date_gmt":"2024-12-30T04:15:30","guid":{"rendered":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/"},"modified":"2025-01-01T22:06:26","modified_gmt":"2025-01-01T19:06:26","slug":"setting-up-a-linux-server-honeypot-a-step-by-step-guide","status":"publish","type":"post","link":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/","title":{"rendered":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide"},"content":{"rendered":"<p><br \/>\n<\/p>\n<p>In an age where cyber threats are more prevalent than ever, setting up a honeypot can be a proactive measure to enhance your cybersecurity posture. Honeypots act as decoys or traps for malicious actors, allowing organizations to monitor, analyze, and learn from malicious activities. In this guide, we will walk you through the process of setting up a Linux server honeypot. <\/p>\n<p><\/p>\n<h3>What You\u2019ll Need<\/h3>\n<p><\/p>\n<ul><\/p>\n<li>A Linux server (Ubuntu, Debian, CentOS, etc.)<\/li>\n<p><\/p>\n<li>Basic knowledge of Linux command-line tools<\/li>\n<p><\/p>\n<li>An internet connection<\/li>\n<p><\/p>\n<li>Root access to your server<\/li>\n<p>\n<\/ul>\n<p><\/p>\n<h3>Step 1: Installing Dependencies<\/h3>\n<p><\/p>\n<p>Before we start, it&#8217;s crucial to update your package list and install the necessary dependencies. Open your terminal and run the following commands:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo apt update &amp;&amp; sudo apt upgrade -y  # For Ubuntu\/Debian<br \/>\n# OR<br \/>\nsudo yum update -y                     # For CentOS<\/code><\/pre>\n<p><\/p>\n<p>Now, install the dependencies:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\"># For Ubuntu\/Debian<br \/>\nsudo apt install git python3 python3-pip -y<br \/>\n<br \/>\n# For CentOS<br \/>\nsudo yum install git python3 python3-pip -y<\/code><\/pre>\n<p><\/p>\n<h3>Step 2: Choose a Honeypot Framework<\/h3>\n<p><\/p>\n<p>While there are multiple honeypot frameworks available, <strong>Cowrie<\/strong> is a popular SSH and Telnet honeypot designed to log brute force attacks and the shell interaction with the attacker.<br \/>\nTo install Cowrie, we will clone the repository from GitHub.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">git clone https:\/\/github.com\/cowrie\/cowrie.git<br \/>\ncd cowrie<\/code><\/pre>\n<p><\/p>\n<h3>Step 3: Setting Up Cowrie<\/h3>\n<p><\/p>\n<p>Before setting up Cowrie, you need to create a new user for it.<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo adduser cowrie<br \/>\nsudo chown -R cowrie:cowrie \/path\/to\/cowrie<\/code><\/pre>\n<p><\/p>\n<p>Now switch to the Cowrie user and install the required Python packages:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo -u cowrie -H pip3 install --upgrade pip setuptools<br \/>\nsudo -u cowrie -H pip3 install -r requirements.txt<\/code><\/pre>\n<p><\/p>\n<h3>Step 4: Configure Cowrie<\/h3>\n<p><\/p>\n<p>Cowrie\u2019s main configuration file is located in the <code>cowrie.cfg<\/code> file. You can customize this file to suit your needs, including specifying the port number, SSH keys, and other settings.<\/p>\n<p><\/p>\n<p>Open the config file with your preferred text editor:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">cd cowrie<br \/>\nnano cowrie.cfg<\/code><\/pre>\n<p><\/p>\n<p>Make the necessary changes. For basic setups, you might want to keep the default settings and just change the <code>host<\/code> and <code>port<\/code> fields.<\/p>\n<p><\/p>\n<h3>Step 5: Set Up Logging and Monitoring<\/h3>\n<p><\/p>\n<p>Honeypots can generate a lot of data, so it is important to set up an organized logging system. Cowrie automatically logs its data into a SQLite database, but you may want to centralize logs or send alerts.<\/p>\n<p><\/p>\n<p>To View Cowrie logs:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">cd cowrie\/log<br \/>\ntail -f cowrie.log<\/code><\/pre>\n<p><\/p>\n<p>For enhanced monitoring, consider installing <strong>ELK Stack<\/strong> (Elasticsearch, Logstash, Kibana) or similar tools to visualize the activity on your honeypot.<\/p>\n<p><\/p>\n<h3>Step 6: Run Cowrie<\/h3>\n<p><\/p>\n<p>Now that everything is set up, you can run Cowrie. Ensure you are still in the Cowrie directory and execute the start script:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo -u cowrie -H twistd -ny cowrie.tac<\/code><\/pre>\n<p><\/p>\n<p>Cowrie should now be successfully running, capturing unauthorized access attempts!<\/p>\n<p><\/p>\n<h3>Step 7: Keep Your Honeypot Secure<\/h3>\n<p><\/p>\n<p>Even though your honeypot is designed to attract attackers, securing it is vital. Here are some quick tips to enhance security:<\/p>\n<p><\/p>\n<ol><\/p>\n<li>\n<p><strong>Firewall Rules<\/strong>: Limit access to your honeypot. For instance, use <code>ufw<\/code> to allow only specific IP addresses:<\/p>\n<p><\/p>\n<pre><code class=\"language-bash\">sudo ufw allow from &lt;your_ip_address&gt; to any port 22<\/code><\/pre>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Keep It Updated<\/strong>: Regularly update both your OS and Cowrie to protect against known vulnerabilities.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li>\n<p><strong>Network Isolation<\/strong>: If possible, run your honeypot on an isolated network to reduce risks to your other systems.<\/p>\n<p>\n<\/li>\n<p><\/p>\n<li><strong>Monitor Logs Regularly<\/strong>: Assess the logs on a consistent basis for any signs of suspicious activities.<\/li>\n<p>\n<\/ol>\n<p><\/p>\n<h3>Conclusion<\/h3>\n<p><\/p>\n<p>Setting up a Linux honeypot such as Cowrie can significantly benefit your understanding of cyber threats and improve your overall defensive strategies. Not only does it serve to lure attackers away from your primary systems, but it actively helps you monitor their tactics and exploit methods. <\/p>\n<p><\/p>\n<p>Stay vigilant and continuously update your honeypot setup to keep pace with advancements in cyber threats. Happy hunting!<\/p>\n<p><\/p>\n<h3>Additional Resources<\/h3>\n<p><\/p>\n<ul><\/p>\n<li><a href=\"https:\/\/github.com\/cowrie\/cowrie\">Cowrie GitHub Repository<\/a><\/li>\n<p><\/p>\n<li>Intro to Honeypots<\/li>\n<p><\/p>\n<li><a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-network-security.html\">Understanding Network Security<\/a><\/li>\n<p>\n<\/ul>\n<p><\/p>\n<hr \/>\n<p><\/p>\n<p>Feel free to adapt this guide to your own preferences or add visual aids to help your readers follow the setup process effectively!<\/p>\n\n","protected":false},"excerpt":{"rendered":"<p>In an age where cyber threats are more prevalent than ever, setting up a honeypot can be a proactive measure to enhance your cybersecurity posture. Honeypots act as decoys or traps for malicious actors, allowing organizations to monitor, analyze, and learn from malicious activities. In this guide, we will walk you through the process of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":863,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[22],"tags":[233,540,265,266,371,279],"class_list":["post-862","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux-security","tag-guide","tag-honeypot","tag-linux","tag-server","tag-setting","tag-stepbystep","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v26.5 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Setting Up a Linux Server Honeypot: A Step-by-Step Guide - WafaTech Blogs<\/title>\n<meta name=\"description\" content=\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide %\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide\" \/>\n<meta property=\"og:description\" content=\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide %\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/\" \/>\n<meta property=\"og:site_name\" content=\"WafaTech Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-30T04:15:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-01T19:06:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"1024\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"WafaTech SA\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:site\" content=\"@wafatech_sa\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WafaTech SA\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/\"},\"author\":{\"name\":\"WafaTech SA\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\"},\"headline\":\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide\",\"datePublished\":\"2024-12-30T04:15:30+00:00\",\"dateModified\":\"2025-01-01T19:06:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/\"},\"wordCount\":555,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png\",\"keywords\":[\"Guide\",\"Honeypot\",\"Linux\",\"Server\",\"Setting\",\"StepbyStep\"],\"articleSection\":[\"Linux Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/\",\"name\":\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide - WafaTech Blogs\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png\",\"datePublished\":\"2024-12-30T04:15:30+00:00\",\"dateModified\":\"2025-01-01T19:06:26+00:00\",\"description\":\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide %\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/12\\\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png\",\"width\":1024,\"height\":1024,\"caption\":\"linux server honeypots setup\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/linux\\\/linux-security\\\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Setting Up a Linux Server Honeypot: A Step-by-Step Guide\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"name\":\"WafaTech Blogs\",\"description\":\"Smart Technologies\",\"publisher\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\"},\"alternateName\":\"WafaTech\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#organization\",\"name\":\"WafaTech Blogs\",\"alternateName\":\"WafaTech\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"contentUrl\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/logo_big.webp\",\"width\":2221,\"height\":482,\"caption\":\"WafaTech Blogs\"},\"image\":{\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/people\\\/WafaTech\\\/61560546351289\\\/\",\"https:\\\/\\\/x.com\\\/wafatech_sa\",\"https:\\\/\\\/www.youtube.com\\\/@wafatech-sa\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/wafatech\\\/\"],\"description\":\"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.\",\"email\":\"sales@wafatech.sa\",\"legalName\":\"Al-Wafa Al-Dhakia For Information Technology LLC\",\"foundingDate\":\"2013-01-08\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/#\\\/schema\\\/person\\\/1a5761fc0feb63ab59d295d7c2648f06\",\"name\":\"WafaTech SA\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g\",\"caption\":\"WafaTech SA\"},\"url\":\"https:\\\/\\\/wafatech.sa\\\/blog\\\/author\\\/omer-yaseen\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide - WafaTech Blogs","description":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide %","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/","og_locale":"en_US","og_type":"article","og_title":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide","og_description":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide %","og_url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/","og_site_name":"WafaTech Blogs","article_publisher":"https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","article_published_time":"2024-12-30T04:15:30+00:00","article_modified_time":"2025-01-01T19:06:26+00:00","og_image":[{"width":1024,"height":1024,"url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png","type":"image\/png"}],"author":"WafaTech SA","twitter_card":"summary_large_image","twitter_creator":"@wafatech_sa","twitter_site":"@wafatech_sa","twitter_misc":{"Written by":"WafaTech SA","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#article","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/"},"author":{"name":"WafaTech SA","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06"},"headline":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide","datePublished":"2024-12-30T04:15:30+00:00","dateModified":"2025-01-01T19:06:26+00:00","mainEntityOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/"},"wordCount":555,"commentCount":0,"publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png","keywords":["Guide","Honeypot","Linux","Server","Setting","StepbyStep"],"articleSection":["Linux Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/","url":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/","name":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide - WafaTech Blogs","isPartOf":{"@id":"https:\/\/wafatech.sa\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#primaryimage"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#primaryimage"},"thumbnailUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png","datePublished":"2024-12-30T04:15:30+00:00","dateModified":"2025-01-01T19:06:26+00:00","description":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide %","breadcrumb":{"@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#primaryimage","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png","width":1024,"height":1024,"caption":"linux server honeypots setup"},{"@type":"BreadcrumbList","@id":"https:\/\/wafatech.sa\/blog\/linux\/linux-security\/setting-up-a-linux-server-honeypot-a-step-by-step-guide\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wafatech.sa\/blog\/"},{"@type":"ListItem","position":2,"name":"Setting Up a Linux Server Honeypot: A Step-by-Step Guide"}]},{"@type":"WebSite","@id":"https:\/\/wafatech.sa\/blog\/#website","url":"https:\/\/wafatech.sa\/blog\/","name":"WafaTech Blogs","description":"Smart Technologies","publisher":{"@id":"https:\/\/wafatech.sa\/blog\/#organization"},"alternateName":"WafaTech","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wafatech.sa\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wafatech.sa\/blog\/#organization","name":"WafaTech Blogs","alternateName":"WafaTech","url":"https:\/\/wafatech.sa\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","contentUrl":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/06\/logo_big.webp","width":2221,"height":482,"caption":"WafaTech Blogs"},"image":{"@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/people\/WafaTech\/61560546351289\/","https:\/\/x.com\/wafatech_sa","https:\/\/www.youtube.com\/@wafatech-sa","https:\/\/www.linkedin.com\/company\/wafatech\/"],"description":"WafaTech, a leading Saudi IT services provider, specializes in cloud solutions, connectivity, and ICT services. Offering secure cloud infrastructure, high-speed internet, and ICT solutions like hosting, backup, and disaster recovery, WafaTech operates a Tier 3 data center at KAUST with ISO certifications. Regulated by CST, the company is committed to innovation, security, and customer satisfaction, empowering businesses in the digital age.","email":"sales@wafatech.sa","legalName":"Al-Wafa Al-Dhakia For Information Technology LLC","foundingDate":"2013-01-08","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/wafatech.sa\/blog\/#\/schema\/person\/1a5761fc0feb63ab59d295d7c2648f06","name":"WafaTech SA","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fde877f001a2e0497276edc0684d3ba2a416c0de8caeb8e785076a1b1b932b3a?s=96&d=mm&r=g","caption":"WafaTech SA"},"url":"https:\/\/wafatech.sa\/blog\/author\/omer-yaseen\/"}]}},"jetpack_featured_media_url":"https:\/\/wafatech.sa\/blog\/wp-content\/uploads\/2024\/12\/Setting-Up-a-Linux-Server-Honeypot-A-Step-by-Step-Guide.png","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/comments?post=862"}],"version-history":[{"count":1,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/862\/revisions"}],"predecessor-version":[{"id":900,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/posts\/862\/revisions\/900"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media\/863"}],"wp:attachment":[{"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/media?parent=862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/categories?post=862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wafatech.sa\/blog\/wp-json\/wp\/v2\/tags?post=862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}