SSH Honeypot Logo

SSH Honeypot

0
Free
Visit Website

This unfortunately named program listens for incoming ssh connections and logs the IP address, username, and password used by the client. It is a low-interaction honeypot that does not allow malware or attackers to login. Originally written to gather rudimentary intelligence on brute force attacks, it is not meant for production usage. It is commonly used at attack/defend CTFs paired with sshunt: https://github.com/droberson/sshunt To set up, make sure headers/development packages are installed for: libssh, openssl, libjson-c, and libpcap. For Linux, run: apt install libssh-dev libjson-c-dev libpcap-dev libssl-dev Build and run with: make ssh-keygen -t rsa -f ./ssh-honeypot.rsa bin/ssh-honeypot -r ./ssh-honeypot.rsa For OSX (experimental/unsupported), ensure xcode is up to date and install libssh and json-c with brew. Specify MakefileOSX with make: make -f MakefileOSX

FEATURES

ALTERNATIVES

A tutorial on setting up Dionaea on an EC2 instance in 20 minutes

Automated script to install and deploy a honeypot with kippo, dionaea, and p0f on Ubuntu 12.04.

Modular honeypot based on Python with support for Siemens S7 protocol.

Beelzebub is an advanced honeypot framework for detecting and analyzing cyber attacks, with integration options for OpenAI GPT-3 and deployment on Kubernetes using Helm.

A simple honeypot that collects credentials across various protocols

An extensible and open-source system for running, monitoring, and managing honeypots with advanced features.

A modular web application honeypot framework with automation and logging capabilities.

An active and aggressive honeypot tool for network security.

PINNED

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2025 - All rights reserved