BW-Pot Logo

BW-Pot

0
Free
Updated 11 March 2025
Visit Website

BW-Pot (Breakable Web applications honeyPot) is a highly interactive honeypot targeting HTTP or HTTPS, observing access from attackers by building easily targeted and compromised web applications. It forwards logs to Google BigQuery for accumulation and visualization, features frequent attack target web app environment usage, daily automatic restoration to a clean environment, real-time log integration with Google BigQuery, automatic log rotation, and saving packet capture files for detailed analysis, operable on low-spec servers. Architecture/Specification: Refer to the architecture diagram and detailed specifications. Installation: Hardware Requirements: 2GB RAM, 10GB SSD, Internet Connection. Software Requirements: Docker, Docker-Compose, logrotate. Service Account Requirements: Google Cloud Platform Account. Usage: Analyze logs forwarded to BigQuery using SQL execution in BigQuery's WebUI, create dashboards specifying BigQuery tables as data sources in the data portal. Licenses: Apache License v2 for Docker, Fluentd, Apache Tomcat; GPL v2 for Wireshark (tshark), WordPress, phpMyAdmin; BSD License for WOWHoneypot. Author: graneed. ToDo: Add Drupal to web applications, store network capture files in /data/tshark/dump/ for download and inspection with WireShark, etc., for log preservation, consider Amazon S3.

FEATURES

SIMILAR TOOLS

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.

A honeypot daemon project for processing, filtering, and redirecting incoming traffic to a sandbox environment.

A DNS server for executing DNS Rebinding attacks

A honeypot for the Log4Shell vulnerability (CVE-2021-44228) with various detection and logging features.

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

A web application honeypot sensor attracting malicious traffic from the Internet

A tool for testing subdomain takeover possibilities at a mass scale.

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved