FTP Honeypot Features: FTP + SSL-FTP Catch used credentials Catch malware files distribute honeytoken files Dependencies: Twisted My site-packages(3) --> common-modules Usage: # Generate Config python ftp.py -d config.xml # Run python ftp.py TODO: retain and analyse Files (Hash, Clam, Virustotal, ...) Contribution welcome. FAQ Generate SSL-Certificates CA: openssl genrsa -out ca.private.key 4096 openssl req -new -x509 -days 4096 -key ca.private.key -out ca.public.key SRV: openssl genrsa -out smtp.private.key 4096 openssl req -new -key smtp.private.key -out smtp.csr openssl x509 -req -days 1024 -in smtp.csr -CA ca.public.key -CAkey ca.private.key -set_serial 01 -out smtp.public.key SSL Check Connection openssl s_client -quiet -connect 127.0.0.1:990 Known Errors OpenSSL.SSL.Error: [('system library', 'fopen', 'No such process'), ('BIO routines', 'FILE_CTRL', 'system lib'), ('SSL routines', 'SSL_CTX_use_certificate_file', 'system lib')] --> Certifcate Files not found (wrong path?) All rights reserved. (c) 2014 by Alexander Bredo
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A low interaction client honeypot that detects malicious websites using signature, anomaly and pattern matching techniques with automated URL collection and JavaScript analysis capabilities.
A serverless application that creates and monitors fake HTTP endpoints as honeytokens to detect attackers, malicious insiders, and automated threats.
A honeypot tool to detect and log CVE-2019-19781 scan and exploitation attempts.
A combination of honeypot, monitoring tool, and alerting system for detecting insecure configurations.
An Apache 2 based honeypot with detection capabilities specifically designed to identify and analyze Struts CVE-2017-5638 exploitation attempts.
A Docker-based honeypot network implementation featuring cowrie and dionaea honeypots with centralized event collection, geolocation enrichment, and real-time attack visualization.