Join us for the Honeynet Workshop 2024: May 27th–29th, Copenhagen, Denmark

Heralding - the credentials catching honeypot

23 Mar 2016 Johnny Vestergaard heralding honeypot

Sometimes (actually, most times) you don’t need advanced deception technology, but rather just a simple tool to answer some simple questions. I was recently in that situation, and needed the answers to the following questions:

  • Which protocols does my adversary try to brute-force?

  • Which username and password did he use?

  • At which speed did he brute-force?

  • From where did he proxy from?

  • What time of day did he brute-force?

To answer these questions, I needed a tool that would output something similar to:

2016-03-12 20:35:02.258198,192.168.2.129,51551,23,telnet,bond,james 2016-03-12 20:35:09.658593,192.168.2.129,51551,23,telnet,clark,P@SSw0rd123 2016-03-18 19:31:38.521047,192.168.2.129,53416,22,ssh,guest,guest 2016-03-18 19:31:39.376768,192.168.2.129,53416,22,ssh,HundeMad,katNIPkat 2016-03-18 19:33:07.064504,192.168.2.129,53431,110,pop3,charles,N00P1SH 2016-03-18 19:33:12.504483,192.168.2.129,53431,110,pop3,NektarManden,mANDENnEktar 2016-03-18 19:36:56.077840,192.168.2.129,53445,21,ftp,Joooop,Pooop

To fulfill my requirements I forked and modified an existing open source project to facilitate the creation of a new simplistic honeypot: 

Heralding - the credentials catching honeypot.

The source code and install instructions can be found in the Github repo here.

Key points: Simplicity works, open source rocks!

Regards,

Johnny Vestergaard

LinkedIN

Mail