MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

A tool for testing subdomain takeover possibilities at a mass scale.

KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

Distributed low interaction honeypot with Agent/Master design supporting various protocol handlers.

A project providing honeypots for embedded device vulnerabilities with support for AWS integration and JSON output.

A web application honeypot sensor attracting malicious traffic from the Internet

A simple web-based interface for subdomain enumeration using the subfinder tool.

Fast web fuzzer written in Go