BW-Pot Logo

BW-Pot

BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.

27
Visit website
Claim and verify your listing
0

BW-Pot Description

BW-Pot (Breakable Web applications honeyPot) is an interactive honeypot system designed to monitor and analyze HTTP/HTTPS attacks by deploying vulnerable web applications as bait. The system creates easily compromised web application environments that attract attackers, allowing security researchers to observe attack patterns and techniques. It includes multiple vulnerable web applications such as WordPress and phpMyAdmin to simulate realistic attack targets. Key features include automatic daily restoration to clean environments, ensuring consistent honeypot states for ongoing monitoring. The system captures comprehensive logs and forwards them to Google BigQuery for centralized storage and analysis. Real-time log integration enables immediate visibility into attack activities. Network traffic analysis capabilities include automatic packet capture file generation, which can be downloaded and analyzed using tools like Wireshark. The system implements automatic log rotation to manage storage efficiently. BW-Pot operates effectively on low-specification servers, requiring only 2GB RAM and 10GB SSD storage. It uses Docker and Docker-Compose for containerized deployment, making installation and management straightforward. The architecture supports integration with Google Cloud Platform for log storage and visualization through BigQuery's web interface. Users can create custom dashboards and execute SQL queries to analyze collected attack data. The system is designed for security researchers, threat hunters, and organizations seeking to understand attack methodologies targeting web applications.

BW-Pot FAQ

Common questions about BW-Pot including features, pricing, alternatives, and user reviews.

BW-Pot is BW-Pot is an interactive web application honeypot that deploys vulnerable applications to attract and monitor HTTP/HTTPS attacks, with automated logging to Google BigQuery for analysis.. It is a Security Operations solution designed to help security teams with Vulnerability Research, Docker, Threat Intelligence.

Have more questions? Browse our categories or search for specific tools.

FEATURED

Heeler Application Security Auto-Remediation Logo

Fix-first AppSec powered by agentic remediation, covering SCA, SAST & secrets.

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

Mandos Fractional CISO Logo

Fractional CISO services for B2B companies to build security programs

POPULAR

RoboShadow Logo

Automated vulnerability assessment and remediation platform

13
OSINTLeak Real-time OSINT Leak Intelligence Logo

Real-time OSINT monitoring for leaked credentials, data, and infrastructure

8
Cybersec Feeds Logo

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

6
TestSavant AI Security Assurance Platform Logo

AI security assurance platform for red-teaming, guardrails & compliance

5
Guide to Ethical Hacking Logo

A comprehensive educational resource that provides structured guidance on penetration testing methodology, tools, and techniques organized around the penetration testing attack chain.

5
View Popular Tools →

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox