yafh

command module
v0.0.0-...-32ff37f Latest Latest
Warning

This package is not in the latest version of its module.

Go to latest
Published: Dec 8, 2017 License: GPL-3.0 Imports: 16 Imported by: 0

README

Yet Another Fake Honeypot

Quickstart

  1. Clone repo locally
    git clone https://github.com/fnzv/YAFH.git && cd YAFH
  2. Get deps
    go get github.com/gliderlabs/ssh && go get github.com/kr/pty
  3. Build and create Go binaries
    go build sshd.go && go build telnetd.go && go build fake-shell.go
  4. Execute the Honeypot(s):
    ./sshd
    ./telnetd



  • All users trying to connecting via TELNET to port 23 will be shown a fake CISCO router login (Any input will lead to telnet shell)
  • All users trying to connect via SSH to port 2222 will login into a fake shell (Password is: password.. it's possible to also remove pass auth &/or use key auth)
  • All the actions executed by malicious users will be saved into yafh-telnet.log / yafh-ssh.log, (same dir where you started the binary file)


    If you want it to run 24/7, you can setup a systemd unit/supervisord running in background keeping the script up or just lunch the command with screen

Running sshd on Docker

  1. Inside repo's directory:
    docker build -t fnzv/yafh-sshd -f Dockerfile.ssh .
  2. Run the container and Expose the SSH Honeypot on port 22:
    docker run -p 22:2222 -d fnzv/yafh-sshd

Running telnetd on Docker

  1. Inside repo's directory:
    docker build -t fnzv/yafh-telnetd -f Dockerfile.telnet .
  2. Run the container and Expose the TELNET Honeypot on port 23:
    docker run -p 23:23 -d fnzv/yafh-telnetd

Demo

asciicast

Tested on Ubuntu 16.04

Documentation

The Go Gopher

There is no documentation for this package.

Jump to

Keyboard shortcuts

? : This menu
/ : Search site
f or F : Jump to
y or Y : Canonical URL