-
Updated Docker Ubuntu Repository for T-Pot
Last spring we released T-Pot and ever since, Docker evolved rapidly with new versions, new features, and eventually a new repository. With regards to early releases of T-Pot and the fast development of Docker, we manually pinned the Docker versions used to the 1.5.x and 1.6.x branches. Now, with the latest Docker releases and Dockers’ switch to a new repository for Ubuntu (and deprecating the one we have been using), we updated the T-Pot ISO and the GitHub project accordingly.
-
Introduction into T-Pot: A Multi-Honeypot Platform
We created a honeypot platform, which is based on the well-established honeypots glastopf, kippo, honeytrap and dionaea, the network IDS/IPS suricata, elasticsearch-logstash-kibana, ewsposter and some docker magic. We want to make this technology available to everyone who is interested and release it as a Community Edition. We want to encourage you to participate.
-
Brand new Design for our "Sicherheitstacho" (Securitymeter)
We have just now updated our Sicherheitstacho to be able to show the data from the community honeypots. Just follow this link.
-
Full Overview about all of Deutsche Telekom's Honeypot Projects
Over the time, we developed a number of projects, which we mostly published on Github.
Parts of them were developed in “one day a month” projects, others in spare time of dedicated persons. Our “one day a month” approach from the central security organization basically means, that the security employees can work one day a month on a technical topic, aside from day-to-day business. The topic must be somehow related to their work, but does not necessarily have to be security-focussed.
-
Introduction to Deutsche Telekom's Honeypot Project
Deutsche Telekom’s honeypot project was started in 2010 by a small group of enthusiasts. We initially started with Lukas Rist’s great Glastopf web honeypot and soon added further honeypot daemons like kippo, honeytrap and dionaea. Over the next years we deployed more and more honeypots.