One problem that all security professionals have is staying ahead of the attacks. Honeypots help in this regard by gaining an insight into how the naydoers attack vulnerable systems. I therefore set out to create a reproduceable honeypot system that could be deployed to any target in a secure and reproduceable manner.
The 2 requirements was to automate the installation of the honeypot software and to integrate the logging to a central system where the logs could be analysed.