MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

A tool for exploiting SSRF and gaining RCE in various servers

A Python-based honeypot service for SSH, FTP, and Telnet connections

A correlated injection proxy tool for XSS Hunter

OpenCanary is a multi-protocol network honeypot with low resource requirements and alerting capabilities.

A honeypot mimicking Tomcat manager endpoints to log requests and save attacker's WAR files for analysis.

Modular honeypot based on Python with support for Siemens S7 protocol.

A comprehensive dashboard for managing and monitoring honeypots with detailed information on attack attempts and connections.

PINNED