Building Honeypots with vcluster and Falco: Episode II
Blog post from Sysdig
In the second installment of a series on building honeypots with Falco and vcluster, the text explores enhancing the functionality of a high-interaction honeypot setup, which initially used vcluster to create an intentionally vulnerable SSH server within a contained environment to avoid broader impacts if compromised. The enhancements involve transitioning to a cloud-native approach by leveraging AWS EC2 instances, addressing the limitations of the previous hardware-dependent setup. By integrating tools like Falcosidekick and Falco Talon, the honeypot is equipped to automatically respond to security threats by terminating compromised pods and spinning up fresh ones, thereby improving response mechanisms. The text details the installation and configuration of these tools, including setting up Falco on Kubernetes, modifying rules for targeted security monitoring, and implementing an automated response system using Falco Talon to handle detected threats. Additionally, the text suggests automating the entire setup and teardown process with a script, emphasizing the experimental nature of the setup and cautioning against exposing it to live environments without proper safeguards.