Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/fnzv/yafh
Yet Another Fake Honeypot written in Go
https://github.com/fnzv/yafh
Last synced: 3 months ago
JSON representation
Yet Another Fake Honeypot written in Go
- Host: GitHub
- URL: https://github.com/fnzv/yafh
- Owner: fnzv
- License: gpl-3.0
- Created: 2017-12-02T16:23:28.000Z (almost 7 years ago)
- Default Branch: master
- Last Pushed: 2017-12-08T17:34:06.000Z (almost 7 years ago)
- Last Synced: 2024-06-19T03:07:48.676Z (5 months ago)
- Language: Go
- Size: 2.98 MB
- Stars: 8
- Watchers: 3
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-honeypot - **5**星
README
## Yet Another Fake Honeypot
### Quickstart
1) Clone repo locally
```git clone https://github.com/fnzv/YAFH.git && cd YAFH```
2) Get deps
```go get github.com/gliderlabs/ssh && go get github.com/kr/pty```
3) Build and create Go binaries
```go build sshd.go && go build telnetd.go && go build fake-shell.go```
4) Execute the Honeypot(s):
```./sshd```
```./telnetd```
- All users trying to connecting via TELNET to port 23 will be shown a fake CISCO router login (Any input will lead to telnet shell)
- All users trying to connect via SSH to port 2222 will login into a fake shell (Password is: password.. it's possible to also remove pass auth &/or use key auth)
- All the actions executed by malicious users will be saved into yafh-telnet.log / yafh-ssh.log, (same dir where you started the binary file)
If you want it to run 24/7, you can setup a systemd unit/supervisord running in background keeping the script up or just lunch the command with screen### Running sshd on Docker
1) Inside repo's directory:
```docker build -t fnzv/yafh-sshd -f Dockerfile.ssh .```
2) Run the container and Expose the SSH Honeypot on port 22:
```docker run -p 22:2222 -d fnzv/yafh-sshd```### Running telnetd on Docker
1) Inside repo's directory:
```docker build -t fnzv/yafh-telnetd -f Dockerfile.telnet .```
2) Run the container and Expose the TELNET Honeypot on port 23:
```docker run -p 23:23 -d fnzv/yafh-telnetd```### Demo
[![asciicast](https://asciinema.org/a/7zu9Fzxeg1twjZfnQ7cQilCBq.png)](https://asciinema.org/a/7zu9Fzxeg1twjZfnQ7cQilCBq)Tested on Ubuntu 16.04