All Projects → 0x4D31 → honeyku

0x4D31 / honeyku

Licence: GPL-3.0 license
A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).

Programming Languages

python
139335 projects - #7 most used programming language
HTML
75241 projects

Projects that are alternatives of or similar to honeyku

honeybits-win
Windows version of honeybits - a PoC tool to create breadcrumbs and honeytokens, to lead the attackers to your honeypots!
Stars: ✭ 20 (-64.29%)
Mutual labels:  honeypot, deception, honeytoken
Ehoney
安全、快捷、高交互、企业级的蜜罐管理系统,护网;支持多种协议蜜罐、蜜签、诱饵等功能。A safe, fast, highly interactive and enterprise level honeypot management system, supports multiple protocol honeypots, honeytokens, baits and other functions.
Stars: ✭ 1,051 (+1776.79%)
Mutual labels:  honeypot, deception, honeytoken
Bootsy
Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (port and service spoofing) for network deception, this tool allows you to detect an attacker on the network quickly by weeding out general noisy alerts with only those that matter.
Stars: ✭ 33 (-41.07%)
Mutual labels:  infosec, deception
HellPot
HellPot is a portal to endless suffering meant to punish unruly HTTP bots.
Stars: ✭ 146 (+160.71%)
Mutual labels:  honeypot, deception
Awesome-Deception
An awesome list of resources on deception-based security with honeypots and honeytokens
Stars: ✭ 61 (+8.93%)
Mutual labels:  honeypot, honeytoken
VindicateTool
LLMNR/NBNS/mDNS Spoofing Detection Toolkit
Stars: ✭ 40 (-28.57%)
Mutual labels:  honeypot, infosec
WebTrap
This project is designed to create deceptive webpages to deceive and redirect attackers away from real websites.
Stars: ✭ 45 (-19.64%)
Mutual labels:  honeypot, deception
Trapdoor
Serverless honeytoken 🕵🏻‍♂️
Stars: ✭ 70 (+25%)
Mutual labels:  honeypot, honeytoken
Miniprint
A medium interaction printer honeypot 🍯
Stars: ✭ 177 (+216.07%)
Mutual labels:  honeypot, infosec
Python Honeypot
OWASP Honeypot, Automated Deception Framework.
Stars: ✭ 160 (+185.71%)
Mutual labels:  honeypot, infosec
Cowrie
Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io
Stars: ✭ 3,810 (+6703.57%)
Mutual labels:  honeypot, deception
weblogic honeypot
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-46.43%)
Mutual labels:  honeypot, deception
DemonHunter
Distributed Honeypot
Stars: ✭ 54 (-3.57%)
Mutual labels:  honeypot, deception
challenges
Security challenges and CTFs created by the Penultimate team.
Stars: ✭ 13 (-76.79%)
Mutual labels:  infosec
telemirror
Telegram forwarder from channels via Telegram Client API (telethon)
Stars: ✭ 66 (+17.86%)
Mutual labels:  heroku
representable
We’re creating maps of communities to fight for fair representation. Add your community to the map today and make your voice heard.
Stars: ✭ 14 (-75%)
Mutual labels:  heroku
dora
Find exposed API keys based on RegEx and get exploitation methods for some of keys that are found
Stars: ✭ 229 (+308.93%)
Mutual labels:  infosec
ai-image-recognition-web
Derin Öğrenme Kütüphanesi Keras ile Python Flask Web Framework Üzerinde Nesne Tanıma Uygulaması - https://vision-image-classify.herokuapp.com/
Stars: ✭ 24 (-57.14%)
Mutual labels:  heroku
telegram-bot-tutorial
Telegram bot tutorial using python and flask
Stars: ✭ 44 (-21.43%)
Mutual labels:  heroku
sinatras-skeleton
Basic Sinatra Skeleton MVC CRUD App with Sprockets, Warden, ActiveRecord and PostgresQL
Stars: ✭ 13 (-76.79%)
Mutual labels:  heroku

Heroku-based honey{pot/token}

License: GPL v3

honeyku (a sister project of honeyλ) is a simple Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).

  • Slack notifications
  • Email and SMS alerts
  • Load config from local file or Amazon S3
  • Customize the HTTP response for each token
  • Designed to be deployed on Heroku Cloud Application Platform
    • Can be also set up on your own server

Description

Honeyku allows you to create and monitor fake HTTP endpoints automatically. You can then place these URL honeytokens in e.g. your inbox, documents, browser history, or embed them as {hidden} links in your web pages. Depending on how and where you implement honeytokens, you may detect human attackers, malicious insiders, content scrapers, or bad bots.

Honeyku is designed to be deployed on Heroku cloud application platform (PaaS), but as it uses Flask microframework it's not dependent to AWS API Gateway (like honeyλ) or any other cloud services. So you can deploy it on your own server as well!

Setup

$ pip install pipenv OR $ brew install pipenv (on macOS)

$ git clone https://github.com/0x4D31/honeyku
$ cd honeyku
  • Edit config.json and fill in your Slack Webhook URL. Change the trap/token configs as you need.
  • You can customize the HTTP response for each token/trap
    • For example you can return a 1x1px beacon image in response and embed the token in your decoy documents or email (tracking pixel!)

Deploy

  • Deploy the app
$ heroku login
$ heroku create
$ git push heroku master
  • Ensure the app is running
$ heroku ps
$ heroku open

Output:

$ git push heroku master
Counting objects: 3, done.
Delta compression using up to 12 threads.
Compressing objects: 100% (3/3), done.
Writing objects: 100% (3/3), 287 bytes | 287.00 KiB/s, done.
Total 3 (delta 2), reused 0 (delta 0)
remote: Compressing source files... done.
remote: Building source:
remote: 
remote: -----> Python app detected
remote:  !     The latest version of Python 3.6 is python-3.6.6 (you are using python-3.7.0, which is unsupported).
remote:  !     We recommend upgrading by specifying the latest version (python-3.6.6).
remote:        Learn More: https://devcenter.heroku.com/articles/python-runtimes
remote:        Skipping installation, as Pipfile.lock hasn't changed since last deploy.
remote: -----> Discovering process types
remote:        Procfile declares types -> web
remote: 
remote: -----> Compressing...
remote:        Done: 55.4M
remote: -----> Launching...
remote:        Released v18
remote:        https://still-chamber-36399.herokuapp.com/ deployed to Heroku
remote: 
remote: Verifying deploy... done.
To https://git.heroku.com/still-chamber-36399.git
   f1414c4..c02b5e3  master -> master

Usage

honeyku

honeyku

Slack Alert

slack

TODO

  • Remote config: load config from Amazon S3
  • Check the source IP address against Threat Intelligence feeds (e.g. Cymon API)
  • SMS alert (Twilio)
  • Logging: Support HTTP endpoint
  • HTTP Client Fingerprinting
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].