
BW-Pot
BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.

BW-Pot
BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.
BW-Pot Description
BW-Pot (Breakable Web applications honeyPot) is an interactive honeypot system designed to monitor and analyze HTTP/HTTPS attacks by deploying vulnerable web applications as bait. The system creates easily compromised web application environments that attract attackers, allowing security researchers to observe attack patterns and techniques. It includes multiple vulnerable web applications such as WordPress and phpMyAdmin to simulate realistic attack targets. Key features include automatic daily restoration to clean environments, ensuring consistent honeypot states for ongoing monitoring. The system captures comprehensive logs and forwards them to Google BigQuery for centralized storage and analysis. Real-time log integration enables immediate visibility into attack activities. Network traffic analysis capabilities include automatic packet capture file generation, which can be downloaded and analyzed using tools like Wireshark. The system implements automatic log rotation to manage storage efficiently. BW-Pot operates effectively on low-specification servers, requiring only 2GB RAM and 10GB SSD storage. It uses Docker and Docker-Compose for containerized deployment, making installation and management straightforward. The architecture supports integration with Google Cloud Platform for log storage and visualization through BigQuery's web interface. Users can create custom dashboards and execute SQL queries to analyze collected attack data. The system is designed for security researchers, threat hunters, and organizations seeking to understand attack methodologies targeting web applications.
FEATURED
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to accelerate sales and compliance
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
Security platform that provides protection, monitoring and governance for enterprise generative AI applications and LLMs against various threats including prompt injection and data poisoning.
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
Fabric Platform is a cybersecurity reporting solution that automates and standardizes report generation, offering a private-cloud platform, open-source tools, and community-supported templates.
A weekly newsletter providing cybersecurity leadership insights, industry updates, and strategic guidance for security professionals advancing to management positions.