I'm new to the Firewalla game, but I've been working on cyber deception research for a few months and was wondering what appetite there would be for a walk-through on setting up a honeypot/honeynet/deception environment on a Firewalla?
I'm interested in hearing if anyone else is running honeypots or deception operations, and if so what kind of telemetry you'd be interested in receiving/sharing in regards to adversary TTPs?
If you're at all interested in this, I can share my methodology and once I get a working prototype I'd be willing to write up a walkthrough on implementation. If nobody else thinks this would be cool, I would just play around with it on my own for a while.
Please sign in to leave a comment.