MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

A Perl honeypot program for monitoring hostile traffic and wasting hackers' time.

A modified version of OpenSSH deamon forwarding commands to Cowrie for logging brute force attacks and shell interactions.

SSH honeypot with rich features for recording and analyzing malicious activities.

Low interaction MySQL honeypot with various configuration options.

KFSensor is an advanced Windows honeypot system for detecting hackers and worms by simulating vulnerable system services.

A high-interaction honeypot system supporting the Redis protocol.

A collection of tools that can be used with Honeyd for data analysis or other purposes

A crawler-based low-interaction client honeypot for exposing website threats.