MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

SMTP Honeypot with custom modules for different modes of operation.

A crawler-based low-interaction client honeypot for exposing website threats.

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

Honeypot tool with bug-catching capabilities and support for multiple protocols.

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

A configurable DNS honeypot with SQLite logging and Docker support.

A mini webserver with FTP support for XXE payloads

A DNS server for executing DNS Rebinding attacks