800+ criminals arrested after FBI turned Anom app into honeypot

Generally, agencies crack messages or seize an already available encrypted communication platform to keep track of cybercriminals. Two such examples would be Encrochat and Phantom Secure, which were encrypted messaging networks. However, it turns out that, like always FBI has been a step ahead of other agencies as it took control of a full-fledged encrypted […]

HosTaGe – Low Interaction Mobile Honeypot

  HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for mobile devices that aims on the detection of malicious, wireless network environments. As most malware propagate over the network via specific protocols, a low-interaction honeypot located at a mobile device can check wireless networks for actively propagating malware. We envision such honeypots running on […]

Snare – Super Next Generation Advanced Reactive honEypot

  snare – Super Next generation Advanced Reactive honEypot Super Next generation Advanced Reactive honEypot About SNARE is a web application honeypot sensor attracting all sort of maliciousness from the Internet. Documentation The documentation can be found here. Basic Concepts Surface first. Focus on the attack surface generation. Sensors and masters. Lightweight collectors (SNARE) and […]

HoneyBOT – Windows Medium Interaction Honeypot

Honeypot creates a safe environment to capture and interact with unsolicited and often malicious traffic on a network. HoneyBOT is an easy to use solution ideal for network security research or as part of an early warning IDS. The logging capability of a honeypot is far greater than any other network security tool and captures […]

CanaryTokens – Implant Honeypots in your Network

Network breaches happen. From mega-corps, to governments. From unsuspecting grandmas to well known security pros. This is (kinda) excusable. What isn’t excusable, is only finding out about it, months or years later. Canary tokens are a free, quick, painless way to help defenders discover they’ve been breached (by having attackers announce themselves.) How Canarytokens works […]

Kippo – SSH Honeypot

Kippo is a medium interaction SSH honeypot designed to log brute force attacks and, most importantly, the entire shell interaction performed by the attacker. Kippo is inspired, but not based on Kojoney. Features Some interesting features: Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included […]

T-Pot Linux – Multi Honeypot Platform

T-Pot is based on debian. The honeypot daemons as well as other support components being used have been paravirtualized using docker. This allowed developers to run multiple honeypot daemons on the same network interface without problems and make the entire system very low maintenance. The encapsulation of the honeypot daemons in docker provides a good isolation […]

honeypot: Use it for catching hackers

Nowdays internal & external networks are not secure, explain ethical hacking researchers. That’s why various security policies are implemented on networking level are implemented. These policies still need many new adaptations for getting a good security measures. Various companies uses network firewalls, IDS, IPS & honeypots for network security. Nowdays most companies are adopting honeypots […]

HoneyPy – A Low To Medium Interaction Honeypot

A low interaction honeypot with the capability to be more of a medium interaction honeypot. HoneyPy is written in Python2 and is intended to be easy to: install and deploy extend with plugins and loggers run with custom configurations Feel free to follow the QuickStart Guide to dive in directly. The main documentation can be […]

T-Pot – Multi Honeypot Platform

T-Pot is based on Ubuntu Server 16.10 LTS. The honeypot daemons as well as other support components being used have been paravirtualized using docker. This allowed developers to run multiple honeypot daemons on the same network interface without problems and make the entire system very low maintenance. The encapsulation of the honeypot daemons in docker provides a […]

Bluepot – Bluetooth Honeypot

Bluepot was a third year university project attempting to implement a fully functional Bluetooth Honeypot. A piece of software designed to accept and store any malware sent to it and interact with common Bluetooth attacks such as “BlueBugging?” and “BlueSnarfing?”. The system also allows monitoring of attacks via a graphical user interface that provides graphs, […]

High Interaction Honeypots with Sysdig and Falco

As well as doing training, challenges and shadowing engagements, MWR interns conduct research projects into a range of areas. The purpose of this research was to investigate sysdig and falco tools, and how we can leverage them in order to quickly set up, monitor and investigate high interaction honeypots. Dennis Panagiotopoulos, 4 January 2017 Project Aims […]

Telnet IoT Honeypot – Python Telnet Honeypot For Catching Botnet Binaries

This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default passwords on telnet servers on the internet. Other than https://github.com/stamparm/hontel or https://github.com/micheloosterhof/cowrie (examples), which provides full (via chroot) or simulated behaviour of a linux system this honeypots goal is just to collect statistics […]

HoneyDrive – A Honeypot Linux Distribution

HoneyDrive is a Xubuntu-based open-source and premier honeypot bundle Linux operating system. It is a pre-configured honeypot system in a virtual hard disk drive (VMDK format) with Xubuntu Desktop 12.04.4 LTS edition installed. It contains over 10 pre-installed and pre-configured Honeypot software packages such as Kippo SSH honeypot, Dionaea and Amun malware honeypots, Honeyd low-interaction honeypot, Glastopf web […]

HoneyPi – Build your own reliable Honeypot

It is astonishingly easy as an attacker to move around on most networks undetected. Let’s face it, unless your organization is big enough to have full packet capture with some expensive IDS, you will likely have no idea if there is an attacker on your network. What are the options for home users and small […]

Honeypot Server Gets Infected with WannaCry Ransomware 6 Times in 90 Minutes

The WannaCry ransomware — also known as WCry, Wana Decrypt0r, WannaCrypt, and WanaCrypt0r — infected a honeypot server made to look like a vulnerable Windows computer six times in the span of 90 minutes, according to an experiment carried out by a French security researcher that goes online by the name of Benkow. During one […]

Tor Honeypot: How to Hack True Identity of Tor Users

Tor is a free software that is widely used by people to protect their identity and avoid network surveillance. The Onion Router (TOR) stops the tracking of your internet activity by directing your traffic through a free and volunteer network of more than 6000 relays spread across the world. Recently a post was published on […]