OWA Honeypot Logo

OWA Honeypot

0
Free
Visit Website

A basic Flask-based Outlook Web App (OWA) honeypot designed for cybersecurity enthusiasts to experiment with OWA-specific threat scenarios. The tool simulates an OWA environment to attract and analyze potential malicious activities, providing valuable insights for defense strategies. To install, clone the GitHub repository, set up a Python3 virtual environment, install dependencies, and run the 'owa_pot.py' script. Caution: Running the honeypot on port 80 is not recommended for internet-facing deployments. For more information, refer to the write-up at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.

FEATURES

ALTERNATIVES

A DNS server for executing DNS Rebinding attacks

A simplified UI for showing honeypot alarms for the DTAG early warning system

Bluetooth Honeypot with monitoring capabilities

A full featured script to visualize statistics from a Shockpot honeypot, based on Kippo-Graph and utilizing various PHP libraries.

An easy to set up SSH honeypot for logging SSH connections and activity.

A tool to bypass Content Security Policy (CSP) restrictions

Distributed low interaction honeypot with Agent/Master design supporting various protocol handlers.

An active and aggressive honeypot tool for network security.

PINNED