Visit Website

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. It replicates the behavior of Intel's AMT management service and serves content pulled from a HP machine to an attacker if successfully exploited. It can be built using the command `go build` and run using the command `./amthoneypot [logfile.txt]`. It also supports persistent execution using the command `nohup ./amthoneypot logfile.txt &`. Additionally, it lacks templating to make content dynamic/random and error checking. This tool is useful for detecting and preventing attacks on Intel's AMT firmware vulnerability CVE-2017-5689.

ALTERNATIVES