Shockpot-Frontend Logo

Shockpot-Frontend

0
Free
Visit Website

Shockpot-Frontend is a full featured script to visualize statistics from a Shockpot honeypot. It requires version of shockpot that logs to postgresql (https://github.com/GovCERT-CZ/shockpot). It is based on Kippo-Graph (https://github.com/ikoniaris/kippo-graph). Thanks to ikoniaris. It uses the Libchart PHP chart drawing library by Jean-Marc Trémeaux, QGoogleVisualizationAPI PHP Wrapper for Google's Visualization API by Thomas Schäfer, RedBeanPHP library by Gabor de Mooij, MaxMind and geoPlugin geolocation technology. REQUIREMENTS: PHP version 5.3.4 or higher. The following packages: libapache2-mod-php5, php5-pgsql, php5-gd, php5-curl. On Ubuntu/Debian: apt-get update && apt-get install -y libapache2-mod-php5 php5-pgsql php5-gd php5-curl /etc/init.d/apache2 restart QUICK INSTALLATION: wget https://github.com/GovCERT-CZ/Shockpot-Frontend/archive/master.zip mv Shockpot-Frontend-master.zip /var/www/html cd /var/www/html unzip Shockpot-Frontend-master.zip mv Shockpot-Frontend-master shockpot-frontend cd shockpot-frontend chmod 777 generated-graphs cp config.php.dist config.php nano config.php #enter the appropriate values Browse to http://your-server/shock

FEATURES

ALTERNATIVES

A local file inclusion exploitation tool

Docker-based honeypot setup with detailed installation and configuration instructions.

A highly interactive honeypot for observing access from attackers by building easily targeted and compromised web applications, forwarding logs to Google BigQuery for accumulation and visualization.

A tool for bruteforcing subdomains of a given domain

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

A medium-interaction PostgreSQL honeypot with configurable settings

SSHoney is an SSH honeypot for logging SSH connection attempts.

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved