Container-Based HoneyLabs
Deception at Scale with Lightweight Containers
PROJECT STATUS:
PLANNEDπ‘ STACK: Podman/Docker Β· FOCUS: Threat Intel Β· Deception TARGET: Blue Teams Β· Researchers
β‘ TL;DR
Honeypots are traditionally resource-intensive VMs. This research explores using container orchestration to deploy dynamic, high-interaction honeypots (SSH, HTTP, Database) that can simulate vulnerable services, log attacker activity, and recycle themselves automatically after compromise.
π¬ Core Research Areas
- High-Interaction Simulation: Making containers look like real vulnerable servers.
- Logging & Monitoring: Capturing TTY sessions and network traffic.
- Isolation: Ensuring the honeypot doesnβt become a pivot point.
- Dynamic Deployment: Spinning up fresh honeypots on demand.
Expected Outcome: A docker-compose / podman play kube setup for a deployable HoneyLab.