Log4Pot Logo

Log4Pot

0
Free
Visit Website

A honeypot designed to detect and capture exploitation attempts of the Log4Shell vulnerability (CVE-2021-44228). It listens on various ports for Log4Shell exploitation, detects exploitation in request lines and headers, downloads exploit payloads recursively, and offers logging to both file and Azure blob storage. To use, install Poetry, clone the GitHub repository, install dependencies, configure parameters in log4pot.conf, and run the tool. It can also be run without external dependencies for basic functionality. For redirecting traffic to Log4Pot, iptables commands can be used.

FEATURES

ALTERNATIVES

A low-interaction SSH authentication logging honeypot that logs all authentication attempts in JSON format.

A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.

High interaction honeypot solution for Linux systems with data control and integrity features.

A low interaction honeypot to detect CVE-2018-2636 in Oracle Hospitality Applications.

A low to medium interaction honeypot with a variety of plugins for cybersecurity monitoring.

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

A highly interactive honeypot for observing access from attackers by building easily targeted and compromised web applications, forwarding logs to Google BigQuery for accumulation and visualization.

An active and aggressive honeypot tool for network security.