Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cymmetria/ciscoasa_honeypot
A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.
https://github.com/cymmetria/ciscoasa_honeypot
cisco cisco-asa execution-vulnerability honeypot security security-tools security-vulnerability vulnerability
Last synced: about 1 month ago
JSON representation
A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.
- Host: GitHub
- URL: https://github.com/cymmetria/ciscoasa_honeypot
- Owner: Cymmetria
- License: mit
- Created: 2018-02-08T15:52:50.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2018-11-23T11:47:10.000Z (about 6 years ago)
- Last Synced: 2024-08-01T17:31:42.110Z (4 months ago)
- Topics: cisco, cisco-asa, execution-vulnerability, honeypot, security, security-tools, security-vulnerability, vulnerability
- Language: JavaScript
- Size: 28.3 KB
- Stars: 51
- Watchers: 10
- Forks: 22
- Open Issues: 5
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-honeypots - ciscoasa_honeypot - 2018-0101, a DoS and remote code execution vulnerability. (Honeypots)
- awesome-honeypots - ciscoasa_honeypot - 2018-0101, a DoS and remote code execution vulnerability. (Honeypots)
- fucking-awesome-honeypots - ciscoasa_honeypot - 2018-0101, a DoS and remote code execution vulnerability. (Honeypots)
- awesome-honeypot - **34**星 - 2018-0101, a DoS and remote code execution vulnerability. (<a id="a53d22b9c5d09dc894413453f4755658"></a>未分类)
README
# Cisco ASA honeypot
Cymmetria Research, 2018.https://www.cymmetria.com/
Contact: [email protected]
A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability
It is released under the MIT license for the use of the community.
# Usage
```
Usage: asa_server.py [OPTIONS]A low interaction honeypot for the Cisco ASA component capable of
detecting CVE-2018-0101, a DoS and remote code execution vulnerabilityOptions:
-h, --host TEXT Host to listen
-p, --port INTEGER Port to listen
-i, --ike-port INTEGER Port to listen for IKE
-s, --enable_ssl Enable SSL
-c, --cert TEXT Certificate File Path (will generate self signed
cert if not supplied)
-v, --verbose Verbose logging
--help Show this message and exit.
Optional settings for hpfeeds logging:
--hpfserver TEXT hpfeeds Server
--hpfport INTEGER hpfeeds Port
--hpfident TEXT hpfeeds Ident
--hpfsecret TEXT hpfeeds Secret
--hofchannel TEXT hpfeeds Channel
--serverid TEXT hpfeeds Serverid
```
The hpfeeds logging options can also be set by using the following os environment variables: HPFEEDS_SERVER, HPFEEDS_PORT, HPFEEDS_IDENT, HPFEEDS_SECRET, HPFEEDS_CHANNEL, SERVERIDSee also
--------https://cymmetria.com/blog/honeypot-cisco-asa-vulnerability/
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0101
Please consider trying out the MazeRunner Community Edition, the free version of our cyber deception platform.
https://community.cymmetria.com/