Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/cymmetria/weblogic_honeypot
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
https://github.com/cymmetria/weblogic_honeypot
deception execution-vulnerability honeypot oracle security security-tools security-vulnerability vulnerability weblogic weblogic-server
Last synced: 3 months ago
JSON representation
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
- Host: GitHub
- URL: https://github.com/cymmetria/weblogic_honeypot
- Owner: Cymmetria
- License: mit
- Created: 2018-02-07T06:11:23.000Z (over 6 years ago)
- Default Branch: master
- Last Pushed: 2020-04-25T20:55:29.000Z (over 4 years ago)
- Last Synced: 2024-04-21T00:11:36.002Z (7 months ago)
- Topics: deception, execution-vulnerability, honeypot, oracle, security, security-tools, security-vulnerability, vulnerability, weblogic, weblogic-server
- Language: Python
- Homepage: https://cymmetria.com/blog/honeypots-for-oracle-vulnerabilities/
- Size: 11.7 KB
- Stars: 31
- Watchers: 5
- Forks: 12
- Open Issues: 3
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-honeypot - **13**星 - 2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability. (<a id="a53d22b9c5d09dc894413453f4755658"></a>未分类)
README
# WebLogic honeypot
Cymmetria Research, 2018.https://www.cymmetria.com/
Written by: Omer Cohen (@omercnet)
Special thanks: Imri Goldberg (@lorgandon), Itamar Sher, Nadav LevContact: [email protected]
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability. The honeypots does a simple simulation of the WebLogic server and will allow attackers to use the vulnerability to attempt to execute code, and will report of such attempts.
It is released under the MIT license for the use of the community, pull requests are welcome!
# Usage
* Run without parameters to listen on default port (8080):
> python weblogic_server.py
* Run with --help to see other command line parameters
See also
--------https://cymmetria.com/blog/honeypots-for-oracle-vulnerabilities/
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-10271
Please consider trying out the MazeRunner Community Edition, the free version of our cyber deception platform.
https://community.cymmetria.com/