Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cymmetria/micros_honeypot
MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This is a directory traversal vulnerability.
https://github.com/cymmetria/micros_honeypot
deception honeypot micros oracle security security-tools security-vulnerability vulnerability
Last synced: 25 days ago
JSON representation
MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This is a directory traversal vulnerability.
- Host: GitHub
- URL: https://github.com/cymmetria/micros_honeypot
- Owner: Cymmetria
- License: mit
- Created: 2018-02-07T05:54:46.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2018-09-25T22:00:12.000Z (about 6 years ago)
- Last Synced: 2024-10-30T15:51:15.521Z (about 1 month ago)
- Topics: deception, honeypot, micros, oracle, security, security-tools, security-vulnerability, vulnerability
- Language: ASP
- Homepage: https://cymmetria.com/blog/honeypots-for-oracle-vulnerabilities/
- Size: 16.6 KB
- Stars: 15
- Watchers: 7
- Forks: 4
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-honeypot - **9**星 - 2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This is a directory traversal vulnerability. (<a id="a53d22b9c5d09dc894413453f4755658"></a>未分类)
README
# MICROS honeypot
Cymmetria Research, 2018.https://www.cymmetria.com/
Written by: Omer Cohen (@omercnet)
Special thanks: Imri Goldberg (@lorgandon), Itamar Sher, Nadav LevContact: [email protected]
MICROS Honeypot is a low interaction honeypot to detect CVE-2018-2636 in the Oracle Hospitality Simphony component of Oracle Hospitality Applications (MICROS). This is a directory traversal vulnerability. The honeypots does a simple simulation of the MICROS server and will allow attackers to use the vulnerability to "steal files", and will report of such attempts.
It is released under the MIT license for the use of the community, pull requests are welcome!
# Usage
* Run without parameters to listen on default port (8080):
> python micros_server.py
* Run with --help to see other command line parameters
See also
--------https://cymmetria.com/blog/honeypots-for-oracle-vulnerabilities/
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-2636
Please consider trying out the MazeRunner Community Edition, the free version of our cyber deception platform.
https://community.cymmetria.com/