MICROS Honeypot Logo

MICROS Honeypot

0
Free
Visit Website

MICROS Honeypot is a low interaction honeypot designed to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This honeypot simulates the MICROS server, allowing attackers to exploit the directory traversal vulnerability to 'steal files' and reports such attempts. It is released under the MIT license for community use, and pull requests are welcome. For usage, run without parameters to listen on the default port (8080) or with --help to see other command line parameters.

FEATURES

ALTERNATIVES

A local file inclusion exploitation tool

ElasticSearch honeypot to capture attempts to exploit CVE-2014-3120, with logging and daemon options.

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.

Endlessh is an SSH tarpit that traps SSH clients by sending an endless, random SSH banner.

Django App for the SSH Honeypot called 'kippo'

A crawler-based low-interaction client honeypot for exposing website threats.

A low-interaction honeypot for detecting and analyzing security threats

SSH honeypot with rich features for recording and analyzing malicious activities.