An Elasticsearch honeypot written in NodeJS, designed to capture every attempt to exploit CVE-2014-3120. Prerequisite: NodeJS - v0.10.x, NodeJS Package Manager - npm v1.4.x. Install by downloading and extracting to /opt/espot, then running the following commands: $ cd /opt/espot $ npm install $ mv config.js-sample config.js. Configure config.js with default responses, logging settings, and timezone. ESPot can send a POST request with JSON data to a provided URL for logging purposes. To run as a daemon, use forever. Source code is released under the General Public License version 3.
Common questions about ESPot including features, pricing, alternatives, and user reviews.
ESPot is ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options. It is a Security Operations solution designed to help security teams with Nodejs.
A logging proxy tool created in response to the 'MongoDB Apocalypse', with Docker support.
A honeypot tool to mimic the router backdoor 'TCP32764' found in various router firmwares, providing a way to test for vulnerabilities.
A nodejs web application honeypot designed for small environments like Raspberry Pi to capture and analyze malicious web-based attacks.
Cloud-native deception platform deploying dynamic security canaries
AI-powered deception platform using honeypots to detect & disrupt attacks