ssh-auth-logger Logo

ssh-auth-logger

0
Free
Visit Website

A low/zero interaction ssh authentication logging honeypot. Structured logging ssh-auth-logger logs all authentication attempts as json making it easy to consume in other tools. No more ugly openssh log parsing vulnerabilities. This is normally logged on one line { "client_version": "SSH-2.0-libssh2_1.4.3", "destinationServicename": "sshd", "dpt": "22", "dst": "192.168.1.2", "duser": "root", "level": "info", "msg": "Request with password", "password": "P@ssword1", "product": "ssh-auth-logger", "server_version": "SSH-2.0-OpenSSH_5.3", "spt": "38624", "src": "192.168.1.4", "time": "2017-11-17T19:16:37-05:00" }

FEATURES

ALTERNATIVES

Open-source honeypot tool for detecting and analyzing malicious activities in the Apache Struts exploit.

SMTP honeypot tool with configurable response messages, email storage, and automatic information extraction.

A PoC tool for utilizing GPT3.5 in developing an SMTP honeypot.

An SDN honeypot tool for detecting and analyzing malicious activities in Software-Defined Networking environments.

Medium interaction SSH honeypot for logging brute force attacks and shell interactions.

A honeypot system that detects and identifies attack commands, recon attempts, and download commands, mimicking a vulnerable Elasticsearch instance.

A tool to generate a PNG image containing a XSS payload

A medium interaction printer honeypot that simulates a standard networked printer

PINNED