Honeypot Setup Script Logo

Honeypot Setup Script

0
Free
Visit Website

A script to install and deploy a honeypot automatically and without user interaction. Currently installs and sets up: kippo, dionaea, p0f. These will all be installed as system services so running this script once should turn a vanilla install into a robust honeypot. Aims to use useful and secure defaults. Currently tested on Ubuntu 12.04. Use with caution: This script will happily and without prompt overwrite files, change the port your SSH server runs and all sorts. It is intended to be run on a vanilla install of Ubuntu 12.04. No thoughts have been made for the integrity of existing installations of software - so be careful! Usage: This script can cause damage to your system. It is meant only to be used on a vanilla installation. Only run this if you know what you are doing. wget -q https://raw.github.com/andrewmichaelsmith/honeypot-setup-script/master/setup.bash -O /tmp/setup.bash && bash /tmp/setup.bash. Effects: Moves SSH server from port 22 to 65534. Installs Dionaea, Kippo, p0f. Sets up Dionaea, Kippo, and p0f as system services that run on startup. Directory Structure: Logging Dionaea: /var/dionaea/, Kippo: /var/kippo/, p0f: /var/p0f/.

FEATURES

ALTERNATIVES

Find domains and subdomains related to a given domain

The DShield Raspberry Pi Sensor is a tool that turns a Raspberry Pi into a honeypot to collect and submit security logs to the DShield project for analysis.

KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

A Python-based honeypot service for SSH, FTP, and Telnet connections

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

A low-interaction honeypot that uses Dionaea as its core, providing a simple and easy-to-use interface for setting up and managing honeypots.

Apache 2 based honeypot for detecting and blocking Struts CVE 2017-5638 exploit with added support for content disposition filename parsing vulnerability.

A honeypot for remote file inclusion (RFI) and local file inclusion (LFI) using fake URLs to catch scanning bots and malwares.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved