An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.
Common questions about ESPot including features, pricing, alternatives, and user reviews.
ESPot is ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options. It is a Security Operations solution designed to help security teams with Nodejs.
ESPot is a free Security Operations tool. This makes it accessible for organizations of all sizes, from startups to enterprises. Visit https://github.com/mycert/ESPot/ for download and installation instructions.
Popular alternatives to ESPot include:
Compare these tools and more at https://cybersectools.com/categories/security-operations
ESPot is for security teams and organizations that need Nodejs. It's particularly suitable for small to medium-sized teams looking for cost-effective solutions. Other Security Operations tools can be found at https://cybersectools.com/categories/security-operations
A logging proxy tool created in response to the 'MongoDB Apocalypse', with Docker support.
A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.
A nodejs web application honeypot designed for small environments like Raspberry Pi to capture and analyze malicious web-based attacks.
Cloud-native deception platform deploying dynamic security canaries