AMT Honeypot Logo

AMT Honeypot

0
Free
Visit Website

A honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689. It replicates the behavior of Intel's AMT management service and serves content pulled from a HP machine to an attacker if successfully exploited. It can be built using the command `go build` and run using the command `./amthoneypot [logfile.txt]`. It also supports persistent execution using the command `nohup ./amthoneypot logfile.txt &`. Additionally, it lacks templating to make content dynamic/random and error checking. This tool is useful for detecting and preventing attacks on Intel's AMT firmware vulnerability CVE-2017-5689.

FEATURES

ALTERNATIVES

A tool for testing subdomain takeover possibilities at a mass scale.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

An LLM-based honeypot file system creator that generates realistic file systems and configurations to lure attackers and improve analyst engagement.

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

A honeypot for malware that spreads via USB storage devices, detecting infections without further information.

A toolkit that transforms PHP applications into web-based high-interaction Honeypots for monitoring and analyzing attacks.

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

A tool for embedding XXE/XML exploits into different filetypes

PINNED