Honeypots – Collect it All

What it is : Honeypot

In computer terminology, a honeypot is a computer security mechanism set to detect, deflect, or, in some manner, counteract attempts at unauthorized use of information systems. Generally, a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site, but is actually isolated and monitored, and that seems to contain information or a resource of value to attackers, who are then blocked. This is similar to police entrapment, colloquially known as “baiting,” a suspect

In other words it will be fooling trap for attacker by which all exploits whether 0-days or known are run against fake system and will produce samples to Analyze Attack.

Why to Use : Advanved and Unknown Attacks Analysis.

When Can be Used : User should set up External Honeypot which are Luring Attackers from Outside Corp Infra world and capture external threat actors or Internal Honeypots in which man-in-the-middle attacks, lateral movement worm activities, insider threats can be caught.

Some of the advantages can be achieved as :

Database Honeypots

  • Database Breach is one one of the biggest threat if occurred. It will cost vulnerable organization with Qunatitative as well Qualitative risks due to years of gathered customers data got exposed with emails, social security numbers, personal informations. Some of the recent infamous database breaches can be categorized as :
  • Equifax Says Cyberattack May Have Affected 143 Million in the U.S. Equifax, one of the three major consumer credit reporting agencies, said on Thursday that hackers had gained access to company data that potentially compromised sensitive information for 143 million American consumers, including Social Security numbers and driver’s license numbers.
  • Restaurant search website Zomato has announced that it has suffered a major security breach, resulting in the theft of a user database containing 17 million users’ names, email addresses and passwords.
  • The hacking of a Kansas data system exposed the Social Security numbers (SSNs) of 5.5 million people from 10 states; data from another 805,000 people who didn’t share their SSNs was also compromised.

  1. MongoDB-HoneyProxy – A MongoDB honeypot proxy created in response to MongoDB Apocalypse as Ransom Attacks Hit 10,000 Servers.
  2. Elastic honey – Elastichoney is a simple elasticsearch honeypot designed to catch attackers exploiting RCE vulnerabilities in elasticsearch.
  3. HoneyDB – High Interaction Database(Maria-DB) Honeypot Solution
  4. NoSQLpot – The NoSQL Honeypot Framework, for NoSQL databases that automates the process of detecting attackers, logging attack incidents.
  5. ESPot – An Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120 – (RCE) vulnerability in ElasticSearch, exploitable by default on ElasticSearch prior to 1.2.0. The bug is found in the REST API, which does not require authentication, where the search function allows dynamic scripts execution
  6. Delilah – An Elasticsearch Honeypot written in Python – acts as a vulnerable Elasticsearch instance that detects and identifies attack commands, recon attempts, and download commands (specifically “wget” and “curl”)

Web Honeypots

  1. Glastopf – Web Application Honeypot in which Popular attack type emulation is already in place like Remote File Inclusion via a build-in PHP sandbox, Local File Inclusion providing files from a virtual file system and HTML injection via POST requests.
  2. Snare/Tanner – successors to Glastopf
    • Snare – Super Next generation Advanced Reactive honEypot focuses on attack surface generation
    • Tanner – Evaluating SNARE events, server Dorks , Adopt and change the responses.
  3. phpmyadmin_honeypot – A simple and effective phpMyAdmin honeypot.
  4. servlet – Web application Honeypot.
  5. Nodepot – A nodejs web application honeypot.
  6. basic-auth-pot bap – http Basic Authentication honeyPot.
  7. Shadow Daemon – A modular Web Application Firewall / High-Interaction Honeypot for PHP, Perl & Python apps.
  8. Servletpot – Web application Honeypot.
  9. Google Hack Honeypot – designed to provide reconnaissance against attackers that use search engines as a hacking tool against your resources.
  10. smart-honeypot – PHP Script demonstrating a smart honey pot.
  11. Bukkit Honeypot Honeypot – A honeypot plugin for Bukkit.
  12. Laravel Application Honeypot – Honeypot – Simple spam prevention package for Laravel applications.
  13. stack-honeypot – Inserts a trap for spam bots into responses.
  14. EoHoneypotBundle – Honeypot type for Symfony2 forms.
  15. shockpot – WebApp Honeypot for detecting Shell Shock exploit attempts.
  16. django-admin-honeypot – A fake Django admin login screen to notify admins of attempted unauthorized access.

WordPress Honeypots

  1. HonnyPotter – A WordPress login honeypot for collection and analysis of failed login attempts.
  2. HoneyPress – python based WordPress honeypot in a docker container.
  3. wp-smart-honeypot – WordPress plugin to reduce comment spam with a smarter honeypot.
  4. wordpot – A WordPress Honeypot.

Service Honeypots

Service Honeypots essentially emulates various services like Printer Service , Camera Service, RDP Services , Webserver responding to Intel’s AMT platform which will attract attackers searching for specific services. These Honeypots can also capture IoT based attackers like Mirai, Perisirai botnets.

  1. honeyntp – NTP logger/honeypot.
  2. honeypot-camera – observation camera honeypot.
  3. troje – a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
  4. HoneyPy – A low interaction honeypot.
  5. Ensnare – Easy to deploy Ruby honeypot.
  6. RDPy – A Microsoft Remote Desktop Protocol (RDP) honeypot in python.
  7. Honeyprint – Printer honeypot.
  8. Tom’s Honeypot – Low interaction Python honeypot.
  9. Honeyport – A simple honeyport written in Bash and Python.
  10. AMTHoneypot – Honeypot for Intel’s AMT Firmware Vulnerability CVE-2017-5689.
  11. Lyrebird – A modern high-interaction honeypot framework.

SSH Honeypots

SMTP Honeypots

Dockerized Honeypots

  • Manuka – Docker based honeypot (Dionaea & Kippo).
  • Dockerized Thug – A dockerized Thug to analyze malicious web content.
  • Dockerpot – A docker based honeypot.
  • Docker honeynet – Several Honeynet tools set up for Docker containers.
  • mhn-core-docker – Core elements of the Modern Honey Network implemented in Docker.

Distributed Honeypots

  • DemonHunter – Low interaction Honepot Server.
  • Smarthoneypot – custom honeypot intelligence system that is simple to deploy and easy to manage.
  • Modern Honey Network – Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management.
  • ADHD – Active Defense Harbinger Distribution (ADHD) is a Linux distro based on Ubuntu LTS. It comes with many tools aimed at active defense preinstalled and configured.
  • Distributed Web Honeypot Project
%d bloggers like this: