AMT Honeypot Logo

AMT Honeypot

0
Free
Visit Website

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. It replicates the behavior of Intel's AMT management service and serves content pulled from a HP machine to an attacker if successfully exploited. It can be built using the command `go build` and run using the command `./amthoneypot [logfile.txt]`. It also supports persistent execution using the command `nohup ./amthoneypot logfile.txt &`. Additionally, it lacks templating to make content dynamic/random and error checking. This tool is useful for detecting and preventing attacks on Intel's AMT firmware vulnerability CVE-2017-5689.

FEATURES

ALTERNATIVES

Script for turning a Raspberry Pi into a Honey Pot Pi with various monitoring and logging capabilities.

A tool to bypass Content Security Policy (CSP) restrictions

A DNS server for executing DNS Rebinding attacks

A medium-interaction PostgreSQL honeypot with configurable settings

An open-source Python software for creating honeypots and honeynets securely.

A simple web-based interface for subdomain enumeration using the subfinder tool.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

Building Honeypots for Industrial Networks using Honeyd and simulating SCADA, DCS, and PLC architectures.