Pasithea Logo

Pasithea

0
Free
Visit Website

Pasithea has a built in install script for easy installs on Ubuntu machines. 1. Run the install script† $ cd PasitheaHoneypot/src $ sudo ./install.sh The script will now run the apt-get application manager and install the required dependencies. You will eventually be prompted to enter the port number you would like Pasithea to run on. Please enter the port number you would like to configure the APIhp on. Press Enter to default to 8080 <your port number here> The install script will automatically compile the Java for you, and create a seperate script that will run the server for you. 3. Run the server! First, you must make the new script executable: $ sudo chmod +x runAPIrest.sh Then, run the server! $ sudo ./runAPIrest.sh After Pasithea has been deployed, any attempt on the API Honeypot will be logged in a '~' delimited log file named API.log in the src folder. If you would like to run Paisthea in the background, check out screen! If you would like to have Paisthea run on boot add the path to your runAPIrest.sh file to your /etc/rc.local file. † NOTE: this install script will attempt to install the nessecary dependencies for Pasithea as we

FEATURES

ALTERNATIVES

A medium-interaction PostgreSQL honeypot with configurable settings

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.

An easy to set up SSH honeypot for logging SSH connections and activity.

A low-interaction honeypot that logs IP addresses, usernames, and passwords used by clients connecting via SSH, primarily used for gathering intelligence on brute force attacks.

A hybrid honeypot framework that combines low and high interaction honeypots for network security

A modern directory scanner that can be used to find hidden directories and files on a web server.

Blacknet is a low interaction SSH multi-head honeypot system with logging capabilities.