Honeypots are useful tools for collecting unauthorized interactions as logs. These logs can be digested to identify new attacking techniques or observe active username/password patterns. In the context of a security team, it could provide actionable information to pre-emptively secure the studied environment.

This tutorial will discuss general SSH honeypot…

A crash course to using `update-alternatives`

First, check the current python3 version reference with python3:

$ python3 -V
Python 3.6.9

You can have python37 output python 3.7.x (where x is the latest version digit) using update-alternatives. First, install Python 3.7.

$ sudo apt-get install python3.7

To make the change, we’ll be using the tool update-alternatives. For…

User and Entity Behavior Analytics (UEBA) is the analysis of user and entity behavior data to detect suspicious behaviors associated with security threats. UEBA tools establish baselines where ‘normal’ behavior can be defined and from which unique behavior can be quantified and tracked.

Source: 20th Century Fox Film Corporation

When unusual behavior is detected, the weight…


I enjoy researching defensive security topics.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store