TL;DR
This time we present an excellent blog post Learn from your attackers – SSH HoneyPot by Robert Putt.
HoneyPot is a deliberately vulnerable system. But not vulnerable as not patched with the latest version of security advisories. You deliberately misconfigure it so it would still be of hacker interests. What is the purpose of such a server? Your goal is to obtain the hacker activities in honeypot logs. This precious information that could help you to protect your real systems. There are high and low interactive honeypots. In this blog post, Robert gives instructions on how to install and configure HonSSH, a high interactive honeypot.