MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

Low-interaction VNC honeypot for logging responses to a static VNC Auth challenge.

A DNS server for executing DNS Rebinding attacks

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

A hybrid honeypot framework that combines low and high interaction honeypots for network security

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

A simple honeypot that collects credentials across various protocols

A tool for testing subdomain takeover possibilities at a mass scale.

HellPot is an endless honeypot that sends unruly HTTP bots to hell with grave consequences.

PINNED