MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

Helix is a versatile honeypot designed to mimic the behavior of various protocols including Kubernetes API server, HTTP, TCP, and UDP.

SHIVA: Spam Honeypot with Intelligent Virtual Analyzer for capturing and analyzing spam data.

Honeypot platform for tracking and monitoring UDP-based DDoS attacks with support for various honeypot services.

An open source honeypot for NoSQL databases with support for Redis and additional features for detecting attackers and logging attack incidents.

Kippo is a medium interaction SSH honeypot with fake filesystem and session logging capabilities.

High-interaction SSH honeypot for logging SSH proxy with ongoing development.

Low interaction MySQL honeypot with various configuration options.

A collection of tools that can be used with Honeyd for data analysis or other purposes