Honeypot services that simulate network services and detect conspicuous behavior can be downloaded from here.
Each service is available for two different architectures: amd64 for dockerized and armhf for BeagleBone Black sensors. Make sure all downloaded files match their linked SHA1 checksums.
| Name | Description | Download |
|---|---|---|
| Conpot | ICS/SCADA honeypot, configured to simulate a Siemens web dashboard | amd64-2.3.0 armhf-2.3.0 Checksums |
| Cowrie | SSH server designed to log brute-force attacks and offer a pseudo-interactive shell to attackers | amd64-2.6.0 armhf-2.6.0 Checksums |
| Dionaea | SMB server that recognizes various exploitable CVEs | amd64-2.7.0 armhf-2.7.0 Checksums |
| Glastopf | Simple HTTP server that lures attackers with randomly generated sites full of exploitable keywords | amd64-2.7.0 armhf-2.7.0 Checksums |
| Heralding | Multi-protocol credentials catching honeypot server | amd64-2.3.0 armhf-2.3.0 Checksums |
| miniprint | Honeypot that acts like a network printer | amd64-2.3.0 armhf-2.3.0 Checksums |
| RDPy | RDP server, configured to show a Windows Server login prompt | amd64-2.2.0 armhf-2.2.0 Checksums |
| Recon | Recon is a small daemon that responds to and logs any incoming TCP or UDP request on arbitrary ports. | amd64-2.2.0 armhf-2.2.0 Checksums |
Refer to our service matrix for further technical details.