AMT Honeypot Logo

AMT Honeypot

0
Free
Visit Website

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. It replicates the behavior of Intel's AMT management service and serves content pulled from a HP machine to an attacker if successfully exploited. It can be built using the command `go build` and run using the command `./amthoneypot [logfile.txt]`. It also supports persistent execution using the command `nohup ./amthoneypot logfile.txt &`. Additionally, it lacks templating to make content dynamic/random and error checking. This tool is useful for detecting and preventing attacks on Intel's AMT firmware vulnerability CVE-2017-5689.

FEATURES

ALTERNATIVES

A collection of tools that can be used with Honeyd for data analysis or other purposes

Honey-Pod for SSH that logs username and password tries during brute-force attacks.

Find domains and subdomains related to a given domain

A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.

RDP based Honeypot that creates virtual machines for incoming connections and analyzes traffic with Suricata.

GHH is a honeypot tool to defend against search engine hackers using Google as a hacking tool.

Python telnet honeypot for catching botnet binaries

Uploader honeypot designed to look like poor website security.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved