Honeypots

< Todos los temas
Imprimir

Honeypots

Lista de honeypots y herramientas para detectar escaneos y ataques

https://github.com/Fedex100/awesome-honeypots

Honeypots

  • Database Honeypots

    • MongoDB-HoneyProxy – A MongoDB honeypot proxy.
    • Elastic honey – A Simple Elasticsearch Honeypot.
    • mysql – A mysql honeypot, still very very early stage.
    • NoSQLpot – The NoSQL Honeypot Framework.
    • ESPot – An Elasticsearch honeypot written in NodeJS, to capture every attempts to exploit CVE-2014-3120.
    • Delilah – An Elasticsearch Honeypot written in Python.
  • Web honeypots

    • Glastopf – Web Application Honeypot.
    • Snare/Tanner – successors to Glastopf
      • Snare – Super Next generation Advanced Reactive honEypot
      • Tanner – Evaluating SNARE events
    • phpmyadmin_honeypot – – A simple and effective phpMyAdmin honeypot.
    • servlet – Web application Honeypot.
    • Nodepot – A nodejs web application honeypot.
    • basic-auth-pot bap – http Basic Authentication honeyPot.
    • Shadow Daemon – A modular Web Application Firewall / High-Interaction Honeypot for PHP, Perl & Python apps.
    • Servletpot – Web application Honeypot.
    • Google Hack Honeypot – designed to provide reconnaissance against attackers that use search engines as a hacking tool against your resources.
    • smart-honeypot – PHP Script demonstrating a smart honey pot.
    • HonnyPotter – A WordPress login honeypot for collection and analysis of failed login attempts.
    • HoneyPress – python based WordPress honeypot in a docker container.
    • wp-smart-honeypot – WordPress plugin to reduce comment spam with a smarter honeypot.
    • wordpot – A WordPress Honeypot.
    • Bukkit Honeypot Honeypot – A honeypot plugin for Bukkit.
    • Laravel Application Honeypot – Honeypot – Simple spam prevention package for Laravel applications.
    • stack-honeypot – Inserts a trap for spam bots into responses.
    • EoHoneypotBundle – Honeypot type for Symfony2 forms.
    • shockpot – WebApp Honeypot for detecting Shell Shock exploit attempts.
    • django-admin-honeypot – A fake Django admin login screen to notify admins of attempted unauthorized access.
  • Service Honeypots

    • honeyntp – NTP logger/honeypot.
    • honeypot-camera – observation camera honeypot.
    • troje – a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.
    • HoneyPy – A low interaction honeypot.
    • Ensnare – Easy to deploy Ruby honeypot.
    • RDPy – A Microsoft Remote Desktop Protocol (RDP) honeypot in python.
    • Honeyprint – Printer honeypot.
    • Tom’s Honeypot – Low interaction Python honeypot.
  • Distributed Honeypots

  • Anti-honeypot stuff

    • kippo_detect – This is not a honeypot, but it detects kippo. (This guy has lots of more interesting stuff)
  • ICS/SCADA honeypots

    • Conpot – ICS/SCADA honeypot.
    • gridpot – Open source tools for realistic-behaving electric grid honeynets .
    • scada-honeynet – mimics many of the services from a popular PLC and better helps SCADA researchers understand potential risks of exposed control system devices.
    • SCADA honeynet – Building Honeypots for Industrial Networks.
    • GasPot – Veeder Root Gaurdian AST, common in the oil and gas industry.
  • Other/random

    • NOVA uses honeypots as detectors, looks like a complete system.
    • Open Canary – A low interaction honeypot intended to be run on internal networks.
    • libemu – Shellcode emulation library, useful for shellcode detection.
    • OFPot – OpenFlow Honeypot, redirects traffic for unused IPs to a honeypot. Built on POX.
    • OpenCanary – Modular and decentralised honeypot.
  • Botnet C2 monitor

    • Hale – Botnet command & control monitor.
  • IPv6 attack detection tool

    • ipv6-attack-detector – Google Summer of Code 2012 project, supported by The Honeynet Project organization.
  • Research Paper

    • vEYE – behavioral footprinting for self-propagating worm detection and profiling.
  • Dynamic code instrumentation toolkit

    • Frida – Inject JavaScript to explore native apps on Windows, Mac, Linux, iOS and Android.
  • Front-end for dionaea

    • DionaeaFR – Front Web to Dionaea low-interaction honeypot.
  • Tool to convert website to server honeypots

    • HIHAT – ransform arbitrary PHP applications into web-based high-interaction Honeypots.
  • Malware collector

    • Kippo-Malware – Python script that will download all malicious files stored as URLs in a Kippo SSH honeypot database.
  • Sebek in QEMU

    • Qebek – QEMU based Sebek. As Sebek, it is data capture tool for high interaction honeypot.
  • Malware Simulator

    • imalse – Integrated MALware Simulator and Emulator.
  • Distributed sensor deployment

    • Smarthoneypot – custom honeypot intelligence system that is simple to deploy and easy to manage.
    • Modern Honey Network – Multi-snort and honeypot sensor management, uses a network of VMs, small footprint SNORT installations, stealthy dionaeas, and a centralized server for management.
    • ADHD – Active Defense Harbinger Distribution (ADHD) is a Linux distro based on Ubuntu LTS. It comes with many tools aimed at active defense preinstalled and configured.
  • Network Analysis Tool

  • Log anonymizer

    • LogAnon – log anonymization library that helps having anonymous logs consistent between logs and network captures.
  • Botnet traffic detection

    • dnsMole – analyse dns traffic, and to potentionaly detect botnet C&C server and infected hosts.
  • Low interaction honeypot (router back door)

  • honeynet farm traffic redirector

    • Honeymole – eploy multiple sensors that redirect traffic to a centralized collection of honeypots.
  • HTTPS Proxy

    • mitmproxy – allows traffic flows to be intercepted, inspected, modified and replayed.
  • System instrumentation

    • Sysdig – open source, system-level exploration: capture system state and activity from a running Linux instance, then save, filter and analyze.
    • Fibratus – tool for exploration and tracing of the Windows kernel.
  • Honeypot for USB-spreading malware

    • Ghost-usb – honeypot for malware that propagates via USB storage devices.
  • Data Collection

    • Kippo2MySQL – extracts some very basic stats from Kippo’s text-based log files (a mess to analyze!) and inserts them in a MySQL database.
    • Kippo2ElasticSearch – Python script to transfer data from a Kippo SSH honeypot MySQL database to an ElasticSearch instance (server or cluster).
  • Passive network audit framework parser

    • pnaf – Passive Network Audit Framework.
  • VM Introspection

  • High-Interaction Honeypots

    • vmitools – C library with Python bindings that makes it easy to monitor the low-level details of a running virtual machine.
  • Binary debugger

  • Mobile Analysis Tool

    • APKinspector – APKinspector is a powerful GUI tool for analysts to analyze the Android applications.
    • Androguard – Reverse engineering, Malware and goodware analysis of Android applications … and more.
  • Low interaction honeypot

    • Honeypoint – platform of distributed honeypot technologies.
    • Honeyperl – Honeypot software based in Perl with plugins developed for many functions like : wingates, telnet, squid, smtp, etc.
  • Honeynet data fusion

    • HFlow2 – data coalesing tool for honeynet/network analysis.
  • Server

    • LaBrea – takes over unused IP addresses, and creates virtual servers that are attractive to worms, hackers, and other denizens of the Internet.
    • Honeysink – open source network sinkhole that provides a mechanism for detection and prevention of malicious traffic on a given network.
    • KFSensor – Windows based honeypot Intrusion Detection System (IDS).
    • Honeyd Also see more honeyd tools.
    • UDPot Honeypot – Simple UDP / DNS honeypot scripts.
    • Conpot – ow interactive server side Industrial Control Systems honeypot.
    • Bifrozt – High interaction honeypot solution for Linux based systems.
    • Beeswarm – Honeypot deployment made easy.
    • Bait and Switch – redirects all hostile traffic to a honeypot that is partially mirroring your production system.
    • Artillery – open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
    • slipm-honeypot – A simple low-interaction port monitoring honeypot.
    • HoneyWRT – low interaction Python honeypot designed to mimic services or ports that might get targeted by attackers.
    • Amun – vulnerability emulation honeypot.
    • TelnetHoney – A simple telnet honeypot.
    • Hontel – Telnet Honeypot.
    • MTPot – Open Source Telnet Honeypot, focused on Mirai malware.
    • Heralding – A credentials catching honeypot.
    • VNC-Pot – A low interaction VNC honeypot.
    • vnclowpot – A low interaction VNC honeypot.
    • SIREN – Semi-Intelligent HoneyPot Network – HoneyNet Intelligent Virtual Environment.
    • telnetlogger – A Telnet honeypot designed to track the Mirai botnet.
  • VM cloaking script

    • Antivmdetect – Script to create templates to use with VirtualBox to make vm detection harder.
  • IDS signature generation

    • Honeycomb – Automated signature creation using honeypots.
  • Lookup service for AS-numbers and prefixes

    • CC2ASN – A simple lookup service for AS-numbers and prefixes belonging to any given country in the world.
  • Web interface (for Thug)

    • Rumal – Thug’s Rumāl: a Thug’s dress & weapon.
  • Data Collection / Data Sharing

    • HPfriends – data-sharing platform.
    • HPFeeds – lightweight authenticated publish-subscribe protocol.
  • Python bindings for libemu

    • Pylibemu – A Libemu Cython wrapper.
  • central management tool

    • PHARM – Manage , Report, Analyze your distributed Nepenthes instances.
  • Network connection analyzer

    • Impost – a network security auditing tool designed to analyze the forensics behind compromised and/or vulnerable daemons.
  • Virtual Machine Cloaking

    • VMCloak – Automated Virtual Machine Generation and Cloaking for Cuckoo Sandbox.
  • Honeypot deployment

    • Modern Honeynet Network – makes deploying and managing secure honeypots extremely simple.
    • SurfIDS – an open source Distributed Intrusion Detection System based on passive sensors.
  • Automated malware analysis system

    • Cuckoo – he leading open source automated malware analysis system.
    • Hybrid Analysis – a free malware analysis service powered by Payload Security that detects and analyzes unknown threats using a unique Hybrid Analysis technology.
  • Low interaction

    • mwcollectd – a versatile malware collection daemon, uniting the best features of nepenthes and honeytrap
  • Low interaction honeypot on USB stick

  • Honeypot extensions to Wireshark

  • Telephony honeypot

  • Client

  • Binary Management and Analysis Framework

  • Honeypot

  • PDF document inspector

  • Distribution system

  • HoneyClient Management

  • Network Analysis

  • Hybrid low/high interaction honeypot

  • Sebek on Xen

  • SSH Honeypots

  • Distributed sensor project

  • A pcap analyzer

  • Client Web crawler

  • Network traffic redirector

  • Honeypot Distribution with mixed content

  • Honeypot sensor

  • File carving

  • File and Network Threat Intelligence

  • Data capture

  • SSH proxy

  • Anti-Cheat

  • behavioral analysis tool for win32

  • Live CD

  • Spamtrap

  • Distributed spam tracking

  • Commercial honeynet

  • Server (Bluetooth)

  • Dynamic analysis of Android apps

  • Dockerized Low Interaction packaging

  • Network analysis

  • Sebek data visualization

  • SIP Server

  • Botnet C2 monitoring

  • low interaction

  • Malware collection

  • IOT Honeypot

  • Active Directory

    • dcept – A tool for deploying and detecting use of Active Directory honeytokens

Honeyd Tools

Network and Artifact Analysis

  • Sandbox

  • Sandbox-as-a-Service

    • malwr.com – free malware analysis service and community.
    • detux.org – Multiplatform Linux Sandbox.
    • Joebox Cloud – analyzes the behavior of malicious files including PEs, PDFs, DOCs, PPTs, XLSs, APKs, URLs and MachOs on Windows, Android and Mac OS X for suspicious activities.

Data Tools

  • Front Ends

    • Tango – Honeypot Intelligence with Splunk.
    • Django-kippo – Django App for kippo SSH Honeypot.
    • Wordpot-Frontend – a full featured script to visualize statistics from a Wordpot honeypot.
    • Shockpot-Frontend – a full featured script to visualize statistics from a Shockpot honeypot.
    • honeypotDisplay – A flask website which displays data I’ve gathered with my SSH Honeypot.
    • honeyalarmg2 – Simplified UI for showing honeypot alarms.
  • Visualization

    • Kippo-Graph – a full featured script to visualize statistics from a Kippo SSH honeypot.
    • Kippo stats – Mojolicious app to display statistics for your kippo SSH honeypot.
    • HoneyStats – A statistical view of the recorded activity on a Honeynet.
    • HoneyMap – Real-time websocket stream of GPS events on a fancy SVG world map.
    • HoneyMalt – Maltego tranforms for mapping Honeypot systems.
    • Glastopf Analytics
    • Afterglow Cloud
    • Afterglow
    • ovizart – visual analysis for network traffic.
    • HpfeedsHoneyGraph – a visualization app to visualize hpfeeds logs.
    • Acapulco – Automated Attack Community Graph Construction.

Guides