Delilah Honeypot Logo

Delilah Honeypot

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

25
Visit website
Compare
Compare
0
MCPThe entire cybersecurity market, one prompt awayTry MCP Access

Delilah Honeypot Description

Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the

Delilah Honeypot FAQ

Common questions about Delilah Honeypot including features, pricing, alternatives, and user reviews.

Delilah Honeypot is A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.. It is a Security Operations solution designed to help security teams with Attack Detection.

Have more questions? Browse our categories or search for specific tools.

ALTERNATIVES

CatchProbe SmartDeceptive Logo

AI-based deception platform for collecting cyber threat intelligence

0
Acalvio ShadowPlex Logo

Deception platform using external-facing decoys for threat intel & recon detection

0
AD Tripwires Logo

Active Directory deception technology for threat detection and response

0
Sesame IT LOKI: Threat Deception Logo

Network deception tool deploying lures to detect & analyze advanced threats.

0
Deception Platform Logo

Cyber deception platform for early threat detection, attacker engagement & response.

0

Stay Updated with Mandos Brief

Get strategic cybersecurity insights in your inbox