ssh-honeypotd Logo

ssh-honeypotd

0
Free
Visit Website

A low-interaction SSH honeypot written in C. Command Line Options: Usage: ssh-honeypotd [options]... Mandatory arguments to long options are mandatory for short options too. Options: -k, --host-key FILE: the file containing the private host key (RSA, DSA, ECDSA, ED25519) -b, --address ADDRESS: the IP address to bind to (default: 0.0.0.0) -p, --port PORT: the port to bind to (default: 22) -P, --pid FILE: the PID file (if not specified, the daemon will run in the foreground) -n, --name NAME: the name of the daemon for syslog (default: ssh-honeypotd) -u, --user USER: drop privileges and switch to this USER (default: daemon or nobody) -g, --group GROUP: drop privileges and switch to this GROUP (default: daemon or nogroup) -x, --no-syslog: log messages only to stderr (only works with --foreground) -f, --foreground: do not daemonize -h, --help: display help and exit -v, --version: output version information and exit -k option must be specified at least once if ssh-honeypots is compiled against libssh prior to 0.8.0 (note that in Ubuntu (and possibly Debian), libssh 0.8.0 is detected as 0.7.0 because of a bug in libssh.h). For newer libssh versions, the host key is generated automatically.

FEATURES

ALTERNATIVES

Detects and prevents SSRF attacks

A python tool for discovering endpoints, parameters, and wordlists in a given target

An extended traceroute tool for CSIRT operators with advanced features.

Load-balancing solution by Microsoft Azure with global infrastructure and financial guidance.

Sniffglue is a network sniffer tool written in Rust with advanced filter sensitivity options and secure packet processing.

A textmode sniffer for tracking tcp streams and capturing data in various modes.

Tcpreplay is a network traffic editing and replay tool used for testing network devices and applications.

Detects the presence of a Responder in the network by sending crafted LLMNR queries.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved