
A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.
Delilah is a honeypot system inspired by Jordan Wright’s Elastichoney that detects and identifies attack commands, recon attempts, and download commands. It acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands. Whenever an attacker issues a download command, Delilah will attempt to download the file the attacker is attempting to introduce on a victim's system. Whenever Delilah detects an attacker's commands, a notification email is sent to one or more email addresses in order to alert analysts in real-time of incoming attacks. Delilah provides a variety of configurable parameters to mimic Elasticsearch instances and prevent an attacker from easily determining that they are interacting with a honeypot. Multiple Delilah nodes can be installed to form a network of sensors. To more easily view the sensor network, analysts should use the
Common questions about Delilah Honeypot including features, pricing, alternatives, and user reviews.
Delilah Honeypot is A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance. It is a Security Operations solution designed to help security teams with Attack Detection.
Delilah Honeypot is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/SecurityTW/delilah/ for download and installation instructions.
Popular alternatives to Delilah Honeypot include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
Delilah Honeypot is for security teams and organizations that need Attack Detection. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
Deception platform using external-facing decoys for threat intel & recon detection
Network deception tool deploying lures to detect & analyze advanced threats.