OWA Honeypot Logo

OWA Honeypot

0
Free
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

ALTERNATIVES

A modular web application honeypot framework with automation and logging capabilities.

A subdomain finder tool

Honeypot for analyzing data with customizable services and logging capabilities.

HoneyDrive is the premier honeypot Linux distro with over 10 pre-installed honeypot software packages and numerous analysis tools.

A honeypot tool emulating HL7 / FHIR protocols with various installation and customization options.

A high-interaction honeypot solution for detecting and analyzing SMB-based attacks

Tango is a set of scripts and Splunk apps for deploying honeypots with ease.

A hybrid honeypot framework that combines low and high interaction honeypots for network security