bap Logo

bap

0
Free
Visit Website

bap is a webservice honeypot that logs HTTP basic authentication credentials in a 'parser friendly format'. The webservice responds with 401 WWW-Authenticate: Basic realm='ADMIN' for HEAD and GET requests, and generates an error response for other HTTP methods. No valid username/password exists, only credentials are logged. Configuration involves setting HTTP_ADDR and HTTP_PORT in bap.py, with default binding to *:8080. Running bap.py starts the service, while start-bap-debian.sh and stop-bap-debian.sh manage background execution. Logging occurs in pot.log in the same directory as bap.py, with entries in the format: [Date Time] Client_address:Client_port Auth_method Decoded_auth_string.

FEATURES

ALTERNATIVES

A signature-based, multi-step, high interaction honeypot detection tool with support for various detection methods and protocols.

An observation camera honeypot for proof-of-concept purposes

A low-interaction honeypot to detect and analyze attempts to exploit the CVE-2017-10271 vulnerability in Oracle WebLogic Server

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

A tool for testing subdomain takeover possibilities at a mass scale.

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved