Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/securitygeneration/Honeyport
Bash and Python Honeyport scripts
https://github.com/securitygeneration/Honeyport
Last synced: about 1 month ago
JSON representation
Bash and Python Honeyport scripts
- Host: GitHub
- URL: https://github.com/securitygeneration/Honeyport
- Owner: securitygeneration
- License: gpl-3.0
- Created: 2014-05-15T19:33:07.000Z (over 10 years ago)
- Default Branch: master
- Last Pushed: 2017-02-22T16:06:33.000Z (almost 8 years ago)
- Last Synced: 2024-08-03T23:03:52.713Z (4 months ago)
- Language: Shell
- Size: 27.3 KB
- Stars: 41
- Watchers: 4
- Forks: 7
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
- awesome-honeypots - Honeyport - Simple honeyport written in Bash and Python. (Honeypots)
- awesome-honeypots - Honeyport - Simple honeyport written in Bash and Python. (Honeypots)
- fucking-awesome-honeypots - Honeyport - Simple honeyport written in Bash and Python. (Honeypots)
README
```
__ _ _
/ _\ ___ ___ _ _ _ __ (_)| |_ _ _
\ \ / _ \ / __|| | | || '__|| || __|| | | |
_\ \| __/| (__ | |_| || | | || |_ | |_| |
\__/ \___| \___| \__,_||_| |_| \__| \__, |
|___/___ _ _
/ _ \ ___ _ __ ___ _ __ __ _ | |_ (_) ___ _ __
/ /_\// _ \| '_ \ / _ \| '__|/ _` || __|| | / _ \ | '_ \
/ /_\\| __/| | | || __/| | | (_| || |_ | || (_) || | | |
\____/ \___||_| |_| \___||_| \__,_| \__||_| \___/ |_| |_|
```http://www.securitygeneration.com - [@securitygen](https://twitter.com/securitygen)
Honeyport scripts
===From:
http://www.securitygeneration.com/security/linux-bash-ncat-honeyport-script-with-iptables-and-dome9-support/http://www.securitygeneration.com/security/honeyport-python-script-with-local-firewall-and-dome9-support/
A honeyport is essentially a simpler version of a honeypot. Whereas honeypots aim to simulate an application or protocol for the attacker to play around with, all the honeyport looks for is a connection from an external party, after which a specific action is performed (usually blacklisting them). Although hosts on the internet are regularly port scanned and connected to by automated attacks, it is usually only targeted attackers who will connect to more unusual ports in order to determine what services are running on them. More often than not, it is these targeted attackers you’ll want to repel.
The Bash script is a fairly simple Linux Bash honeyport script that uses Ncat to listen on a given port, and then blocks the IP of anyone who connects to it. It can block the attacker using Linux’s internal IPtables firewall, or it can add the IP to your Dome9 Dynamic Firewall Blacklist if you use that service (free for up to 5 servers). The benefit of the Dome9 solution is that any IP that gets blacklisted on one system is automatically and instantly blacklisted across all of your Dome9-enabled servers. The script also has a whitelist so you can prevent certain IPs from getting blocked. Also, I chose Ncat over Netcat as it’s more extensible and could allow you to do more interesting things with your Honeyport. In this case when someone connects the script will execute ‘response.sh’.
The Python script has the same functionality as the Bash script but supports IPFW on Mac OS X, iptables on Linux and Windows Firewall on Windows. It also allows you to define a custom script to be run upon each user connection, and the client's IP is passed to the script as an argument. The output of the script is returned to the connected user before they are blacklisted.
Bash ChangeLog -
- 0.1: Initial release with whitelisting (2013-08-21)
- 0.2: Added Dome9 IP Blacklist TTL option (2013-11-27)
- 0.3: Added logfile location config (2014-04-09)
- 0.4: Added checks for ncat (2015-02-03)
- 0.5: Cleaned up deprecated syntax (2017-01-27)
Python ChangeLog -
- 0.1: Initial release (2014-05-15)The honeystats.sh script will parse the honeyport.log file and output some statistics about connections that have been logged, including a visual chart of connections. Any visible spikes could be an indication of a directed attack, as opposed to background internet scanning.
![Honeystats](https://www.securitygeneration.com/temp/honeyport.png)