heralding v1.0.6 releases: Credentials catching honeypot
Sometimes you just want a simple honeypot that collects credentials, nothing more. Heralding is that honeypot! Currently, the following protocols are supported: ftp, telnet, ssh, http, https, pop3, pop3s, imap, imaps, smtp, vnc, postgresql, and socks5.
You need Python 3.5.0 or higher.
- Added RDP capability (#25)
- Added MySQL capability (#76)
- Fixed HPFeeds bug (#123)
- Added basic password cracker
- Various minor fixes and improvements
For step by step instructions on how to install and run heralding in a Python virtual environment using Ubuntu, see this guide. Otherwise, the basic installation instructions are below.
To install the latest stable (well, semi-stable) version, use pip:
pip install heralding
Make sure that requirements and pip are installed. A simple way to do this on a Debian-based OS is:
sudo apt-get install python-pip python-dev build-essential libssl-dev libffi-dev git clone https://github.com/johnnykv/heralding.git cd heralding sudo pip install -r requirements.txt
And finally start the honeypot:
mkdir tmp cd tmp sudo heralding
Starting the honeypot
Viewing the collected data
Heralding logs relevant data in three files, log_session.json, log_auth.csv, and log_session.json.
This log file contains all available information for a given activity to the honeypot. This included a timestamp, authentication attempts and protocol-specific information (auxiliary data) – and a bunch of other information. Be aware that the log entry for a specific session will appear in the log file after the session has ended. The format is jsonlines.
This log file contains entries for all connections to the honeypot. The data includes timestamp, duration, IP information and the number of authentication attempts. Be aware that the log entry for a specific session will appear in the log fil after the session has ended.
This log file contains information for all authentication attempts where it was possible to log username and plaintext password. Log entries will appear in this file as soon as the password has been transmitted.
Copyright (C) 2016 johnnykv