Untitled Document
Untitled Document
ID: CEH-2404
Name: Morium Mohini
Mentor: Shajid Ahmed Khan
What is Cowrie?
Cowrie is an open-source honeypot designed to simulate an SSH server, allowing for the
capture of interactions with attackers.
Key Features:
● SSH Emulation: Cowrie can imitate a vulnerable SSH server, enticing attackers to
engage with it.
● Brute-force Attack Logging: It logs all attempted logins, including failed attempts,
providing insights into common attack patterns.
● Session Capture: Cowrie captures the full interaction of attackers, recording
commands they attempt to execute.
Setting Up Cowrie
System Requirements:
Installation Steps:
2 . Install Dependencies:
1 sudo apt update
2 sudo apt install python3-pip python3-dev libssl-dev
3 sudo pip3 install and more
3 . Cowrie Installation
# ./bin/cowrie start
Monitoring Activity:
Cowrie provides a web interface accessible through a browser, displaying real-time
statistics. Additionally, log files are generated in the log directory, detailing all
captured activities.
Analyzing Collected Data
Types of Data Captured:
Security Implications
Advantages of Using Cowrie:
Potential Risks:
● Misconfiguration: If not set up properly, a honeypot can inadvertently expose
real vulnerabilities in the network.
● Legal Considerations: Deploying a honeypot may raise legal issues regarding
data collection and privacy.
Conclusion
Cowrie is a powerful tool for enhancing SSH security
through proactive monitoring and data collection. By
implementing this honeypot, organizations can gain
significant insights into attacker behavior, allowing them to
strengthen their defenses. Future work may involve
integrating Cowrie with other security tools and expanding
its capabilities for more comprehensive threat detection