SSH Honeypot Logo

SSH Honeypot

0
Free
Visit Website

This unfortunately named program listens for incoming ssh connections and logs the IP address, username, and password used by the client. It is a low-interaction honeypot that does not allow malware or attackers to login. Originally written to gather rudimentary intelligence on brute force attacks, it is not meant for production usage. It is commonly used at attack/defend CTFs paired with sshunt: https://github.com/droberson/sshunt To set up, make sure headers/development packages are installed for: libssh, openssl, libjson-c, and libpcap. For Linux, run: apt install libssh-dev libjson-c-dev libpcap-dev libssl-dev Build and run with: make ssh-keygen -t rsa -f ./ssh-honeypot.rsa bin/ssh-honeypot -r ./ssh-honeypot.rsa For OSX (experimental/unsupported), ensure xcode is up to date and install libssh and json-c with brew. Specify MakefileOSX with make: make -f MakefileOSX

FEATURES

ALTERNATIVES

A low-interaction SSH honeypot tool for recording authentication attempts.

A tutorial on setting up Dionaea on an EC2 instance in 20 minutes

Multi-honeypot platform with various honeypots and monitoring tools.

A modular web application honeypot framework with automation and logging capabilities.

An LLM-based honeypot file system creator that generates realistic file systems and configurations to lure attackers and improve analyst engagement.

IMAP-Honey is a honeypot tool for IMAP and SMTP protocols with support for logging to console or syslog.

A low Interaction Client honeypot designed to detect malicious websites through signature, anomaly and pattern matching techniques.

A crawler-based low-interaction client honeypot for exposing website threats.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved