implementing-network-deception-with-honeypots

Installation
SKILL.md

Implementing Network Deception with Honeypots

When to Use

  • When deploying deception technology to detect lateral movement
  • To create early warning indicators for network intrusion
  • During security architecture design to add detection depth
  • When monitoring for unauthorized internal scanning or credential theft
  • To gather threat intelligence on attacker techniques and tools

Prerequisites

  • Linux server or VM for honeypot deployment (Ubuntu 22.04+ recommended)
  • Python 3.8+ with pip for OpenCanary installation
  • Docker for T-Pot or containerized deployment
  • Network segment with appropriate VLAN configuration
  • SIEM integration for alert forwarding (syslog, webhook, or file-based)
  • Firewall rules allowing inbound connections to honeypot services
Related skills
Installs
5
GitHub Stars
6.2K
First Seen
Mar 16, 2026