ESPot
ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options.

ESPot
ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options.
ESPot Description
An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.
ESPot FAQ
Common questions about ESPot including features, pricing, alternatives, and user reviews.
ESPot is ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options.. It is a Security Operations solution designed to help security teams with Exploit, Elasticsearch, Honeypot.
FEATURED
Cybercrime intelligence tools for searching compromised credentials from infostealers
Password manager with end-to-end encryption and identity protection features
VPN service providing encrypted internet connections and privacy protection
Fractional CISO services for B2B companies to build security programs
Stay Updated with Mandos Brief
Get the latest cybersecurity updates in your inbox
TRENDING CATEGORIES
POPULAR
A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.
AI security assurance platform for red-teaming, guardrails & compliance
Real-time OSINT monitoring for leaked credentials, data, and infrastructure