h0neytr4p: configure Honeypot for Blue Team
h0neytr4p
Honeytrap (a.k.a h0neytr4p) is easy to configure, deploy honeypot for protecting against web recon and exploiting.
How does it work?
Blue teams can create a trap for each vulnerability or exploit or recon technique and place it in the /traps folder and restart h0neytr4p. This will automatically reload the configuration and start the h0neytr4p.
What does it protect against?
h0neytr4p was primarily built to remove the pain of creating a vulnerable application for publicly facing honeypots. While there’s no denying the fact that creating an end-to-end vulnerable application might have its own advantages, we need something flexible, agile framework for trapping the notorious bad guys. Some of the common use-cases are:
- Let’s say you received an advisory that some ABC group is targetting a web RCE 1day and you want to detect the exploitation or recon attempts, you are at the right place.
- You want to know who’s scanning your external attack surface using the new cutting-edge tools like nuclei or nmap? this tool got it covered.
How to deploy it?
The tool was built on top of Golang which means it can be easily compiled to your server/machine platform and architecture.
git clone https://github.com/pbssubhash/h0neytr4p
cd h0neytr4p
go build main.go
Use
Copyright (C) 2021 pbssubhash