Honeypot services that simulate network services and detect conspicuous behavior can be downloaded from here.
Each service is available for two different architectures: amd64 for dockerized and armhf for BeagleBone Black sensors. Make sure all downloaded files match their linked SHA1 checksums.
Name | Description | Download |
---|---|---|
Conpot | ICS/SCADA honeypot, configured to simulate a Siemens web dashboard | amd64-2.3.0 armhf-2.3.0 Checksums |
Cowrie | SSH server designed to log brute-force attacks and offer a pseudo-interactive shell to attackers | amd64-2.6.0 armhf-2.6.0 Checksums |
Dionaea | SMB server that recognizes various exploitable CVEs | amd64-2.7.0 armhf-2.7.0 Checksums |
Glastopf | Simple HTTP server that lures attackers with randomly generated sites full of exploitable keywords | amd64-2.7.0 armhf-2.7.0 Checksums |
Heralding | Multi-protocol credentials catching honeypot server | amd64-2.3.0 armhf-2.3.0 Checksums |
miniprint | Honeypot that acts like a network printer | amd64-2.3.0 armhf-2.3.0 Checksums |
RDPy | RDP server, configured to show a Windows Server login prompt | amd64-2.2.0 armhf-2.2.0 Checksums |
Recon | Recon is a small daemon that responds to and logs any incoming TCP or UDP request on arbitrary ports. | amd64-2.2.0 armhf-2.2.0 Checksums |
Refer to our service matrix for further technical details.