Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/mushorg/glastopf
Web Application Honeypot
https://github.com/mushorg/glastopf
Last synced: 3 months ago
JSON representation
Web Application Honeypot
- Host: GitHub
- URL: https://github.com/mushorg/glastopf
- Owner: mushorg
- Created: 2012-11-15T21:57:07.000Z (about 12 years ago)
- Default Branch: master
- Last Pushed: 2024-07-23T07:54:39.000Z (6 months ago)
- Last Synced: 2024-08-01T01:28:53.347Z (6 months ago)
- Language: Python
- Homepage: http://glastopf.org
- Size: 2.95 MB
- Stars: 544
- Watchers: 51
- Forks: 172
- Open Issues: 2
-
Metadata Files:
- Readme: README.rst
- Changelog: Changelog.txt
Awesome Lists containing this project
- awesome-honeypots - Glastopf - Web Application Honeypot. (Honeypots)
- awesome-malware-analysis - Glastopf - Web application honeypot. (Malware Collection / Honeypots)
- awesome-honeypots - Glastopf - Web Application Honeypot. (Honeypots)
- fucking-awesome-malware-analysis - Glastopf - Web application honeypot. (Malware Collection / Honeypots)
- fucking-awesome-honeypots - Glastopf - Web Application Honeypot. (Honeypots)
- awesome-honeypot - **398**星
- awesome-cyber-security - Glastopf - A web application honeypot that emulates vulnerable websites to gather information on web-based attacks. (Tools / Network Security)
- awesome-cyber-security - Glastopf - A web application honeypot that emulates vulnerable websites to gather information on web-based attacks. (Tools / Network Security)
README
We highly recommend to check out the Glastopf successor `SNARE `_ and `TANNER `_.
Glastopf |Build Status|
=======================.. |Build Status| image:: https://travis-ci.org/mushorg/glastopf.svg?branch=master
:target: https://travis-ci.org/mushorg/glastopfABOUT
-----Glastopf is a Python web application honeypot founded by Lukas Rist.
General approach:
- Vulnerability *type* emulation instead of vulnerability emulation. Once a vulnerability type is emulated, Glastopf can handle unknown attacks of the same type. While implementation may be slower and more complicated, we remain ahead of the attackers until they come up with a new method or discover a new flaw in our implementation.
- Modular design to add new logging capabilities or attack type handlers. Various database capabilities are already in place. HPFeeds logging is supported for centralized data collection.
- Popular attack type emulation is already in place: Remote File Inclusion via a build-in PHP sandbox, Local File Inclusion providing files from a virtual file system and HTML injection via POST requests.
- Adversaries usually use search engines and special crafted search requests to find their victims. In order to attract them, Glastopf provides those keywords (AKA "dork") and additionally extracts them from requests, extending its attack surface automatically. As a result, the honeypot gets more and more attractive with each new attack attempted on it.
- We will make the SQL injection emulator public, provide IP profiling for crawler recognition and intelligent dork selection.INSTALL
-------
Installation instructions can be found `here `_.It is highly recommended to customize the default attack surface to avoid trivial detection of the honeypot.