{"componentChunkName":"component---src-templates-post-template-js","path":"/honeypot-tpot-modules-en","result":{"data":{"markdownRemark":{"id":"9cbea69f-d96a-587f-b22f-bcdc9ba9dfb2","html":"<blockquote>\n<p>This page has been machine-translated from the <a href=\"/honeypot-tpot-modules\">original page</a>.</p>\n</blockquote>\n<p>The other day I wrote an article about <a href=\"/honeypot-setup-on-azure-en\">setting up a honeypot on Azure</a>, and this is a continuation of that.</p>\n<p>As I begin actual honeypot operations, I decided to review the modules and honeypots that T-Pot runs, which I installed last time.</p>\n<p>There were 25 types of honeypots built into T-Pot, so it took quite a while lol</p>\n<h2 id=\"about-this-article\" style=\"position:relative;\"><a href=\"#about-this-article\" aria-label=\"about this article permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About this Article</h2>\n<p><strong>The content of this article is not intended to encourage acts that violate social order.</strong></p>\n<p>Please be aware that attempting attacks on environments other than your own or those you have permission to access may violate the “Act on Prohibition of Unauthorized Computer Access (Unauthorized Access Prohibition Act)“.</p>\n<p>All statements are attributed to me personally, not to any organization I belong to.</p>\n<!-- omit in toc -->\n<h2 id=\"table-of-contents\" style=\"position:relative;\"><a href=\"#table-of-contents\" aria-label=\"table of contents permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Table of Contents</h2>\n<ul>\n<li><a href=\"#about-this-article\">About this Article</a></li>\n<li>\n<p><a href=\"#about-t-pot-consoles\">About T-Pot Consoles</a></p>\n<ul>\n<li><a href=\"#cockpit\">Cockpit</a></li>\n<li><a href=\"#cyberchef\">Cyberchef</a></li>\n<li><a href=\"#elasticserch-head\">Elasticserch Head</a></li>\n<li><a href=\"#kibana\">Kibana</a></li>\n<li><a href=\"#security-meter\">Security Meter</a></li>\n<li><a href=\"#spiderfoot\">Spiderfoot</a></li>\n<li><a href=\"#t-potgithub\">T-Pot@Github</a></li>\n</ul>\n</li>\n<li>\n<p><a href=\"#types-of-honeypots\">Types of Honeypots</a></p>\n<ul>\n<li><a href=\"#adbhoney\">ADBHoney</a></li>\n<li><a href=\"#cisco-asa-honeypot\">Cisco ASA honeypot</a></li>\n<li><a href=\"#honepot-for-cve-2019-19781-citrix-adc\">Honepot for CVE-2019-19781 (Citrix ADC)</a></li>\n<li><a href=\"#conpot\">CONPOT</a></li>\n<li><a href=\"#cowrie\">Cowrie</a></li>\n<li><a href=\"#ddospot\">DDoSPot</a></li>\n<li><a href=\"#dicompot\">Dicompot</a></li>\n<li><a href=\"#dionaea\">Dionaea</a></li>\n<li><a href=\"#elasticpot\">ElasticPot</a></li>\n<li><a href=\"#endlessh\">Endlessh</a></li>\n<li><a href=\"#glutton\">Glutton</a></li>\n<li><a href=\"#heralding\">Heralding</a></li>\n<li><a href=\"#hellpot\">HellPot</a></li>\n<li><a href=\"#honeypots\">Honeypots</a></li>\n<li><a href=\"#honeypy\">HoneyPy</a></li>\n<li><a href=\"#honeysap\">HoneySAP</a></li>\n<li><a href=\"#honeytrap\">Honeytrap</a></li>\n<li><a href=\"#ipp-honey\">IPP Honey</a></li>\n<li><a href=\"#log4pot\">Log4Pot</a></li>\n<li><a href=\"#mailoney\">Mailoney</a></li>\n<li><a href=\"#medpot\">medpot</a></li>\n<li><a href=\"#rdpy\">RDPY</a></li>\n<li><a href=\"#redishoneypot\">RedisHoneyPot</a></li>\n<li><a href=\"#snare-and-tanner\">SNARE and TANNER</a></li>\n</ul>\n</li>\n<li><a href=\"#summary\">Summary</a></li>\n</ul>\n<h2 id=\"about-t-pot-consoles\" style=\"position:relative;\"><a href=\"#about-t-pot-consoles\" aria-label=\"about t pot consoles permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>About T-Pot Consoles</h2>\n<p>As seen at the end of <a href=\"/honeypot-setup-on-azure-en\">the previous article</a>, the T-Pot console after login looks like this.</p>\n<p>This time I’ll look at each console.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/0b533/image-33.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 75.83333333333333%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/8ac56/image-33.webp 240w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/d3be9/image-33.webp 480w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/b0a15/image-33.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/8ff5a/image-33.png 240w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/e85cb/image-33.png 480w,\n/static/f0ab2d6a94b5abd4c24262218ad0c256/0b533/image-33.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/f0ab2d6a94b5abd4c24262218ad0c256/0b533/image-33.png\"\n            alt=\"image-33.png\"\n            title=\"image-33.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h3 id=\"cockpit\" style=\"position:relative;\"><a href=\"#cockpit\" aria-label=\"cockpit permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cockpit</h3>\n<p>“Cockpit” is a web console application that can monitor Linux system containers, storage, networks, services, logs, etc.</p>\n<p>Reference: <a href=\"https://github.com/cockpit-project/cockpit\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cockpit-project/cockpit: There’s code a goin’ on</a></p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/f4f504f1208b469e47152dc3e7d9cbd7/0b533/image-57.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 70%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/f4f504f1208b469e47152dc3e7d9cbd7/8ac56/image-57.webp 240w,\n/static/f4f504f1208b469e47152dc3e7d9cbd7/d3be9/image-57.webp 480w,\n/static/f4f504f1208b469e47152dc3e7d9cbd7/b0a15/image-57.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/f4f504f1208b469e47152dc3e7d9cbd7/8ff5a/image-57.png 240w,\n/static/f4f504f1208b469e47152dc3e7d9cbd7/e85cb/image-57.png 480w,\n/static/f4f504f1208b469e47152dc3e7d9cbd7/0b533/image-57.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/f4f504f1208b469e47152dc3e7d9cbd7/0b533/image-57.png\"\n            alt=\"image-57.png\"\n            title=\"image-57.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>As shown in the image above, it visualizes system resource usage in real time.</p>\n<p>Convenient.</p>\n<h3 id=\"cyberchef\" style=\"position:relative;\"><a href=\"#cyberchef\" aria-label=\"cyberchef permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cyberchef</h3>\n<p>A local version of Cyberchef is available for use within the T-Pot machine.</p>\n<h3 id=\"elasticserch-head\" style=\"position:relative;\"><a href=\"#elasticserch-head\" aria-label=\"elasticserch head permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Elasticserch Head</h3>\n<p>A web console for viewing and operating Elastic Search Clusters.</p>\n<p>Reference: <a href=\"https://mobz.github.io/elasticsearch-head/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">ElasticSearch Head</a></p>\n<p>Reference: <a href=\"https://www.elastic.co/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Free and Open Search: The Creators of Elasticsearch, ELK &#x26; Kibana | Elastic</a></p>\n<p>Elastic Search is a distributed search and analytics engine.</p>\n<p>In other words, it’s a tool for efficiently extracting necessary information from large amounts of information.</p>\n<p>It seems Elasticsearch can be used for various purposes.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/e6a143048f9e5c511fee00d6e6b03279/0b533/image-59.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 67.5%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/e6a143048f9e5c511fee00d6e6b03279/8ac56/image-59.webp 240w,\n/static/e6a143048f9e5c511fee00d6e6b03279/d3be9/image-59.webp 480w,\n/static/e6a143048f9e5c511fee00d6e6b03279/b0a15/image-59.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/e6a143048f9e5c511fee00d6e6b03279/8ff5a/image-59.png 240w,\n/static/e6a143048f9e5c511fee00d6e6b03279/e85cb/image-59.png 480w,\n/static/e6a143048f9e5c511fee00d6e6b03279/0b533/image-59.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/e6a143048f9e5c511fee00d6e6b03279/0b533/image-59.png\"\n            alt=\"image-59.png\"\n            title=\"image-59.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Reference: <a href=\"https://www.elastic.co/elasticsearch/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Elasticsearch: The Official Distributed Search &#x26; Analytics Engine | Elastic</a></p>\n<p>I don’t fully understand it yet, but it seems Elasticsearch is composed of Clusters consisting of multiple Elasticsearch Server Nodes to increase search traffic and distribute data and writes.</p>\n<p>I think Elasticsearch Head is probably a tool that can operate this Cluster.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/d7b44705f92eaa9c63fd9472fa1c072a/0b533/image-58.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 35.416666666666664%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAABQAAAAHCAYAAAAIy204AAAACXBIWXMAARlAAAEZQAGA43XUAAABJElEQVQoz62Q/W6CQBDEff/36t+N0ibVRhTt8XlwHxwgKvy6aNMncJPNbHIzu3Oz2u62RNs977uT9JnPQ0qWl6hCsTluWMdrqrrEOUvdNGitaYzBeUcbAtYJto5SN6wPOSukbtNMUgjZes65pu8H+mEgryyN7YiPKao0aOPY7WOKSvPxtSNOTvg2kKQF+5MiLarnwqWGG3LN8h3vUSrBW4N3I8Z7lFN015FJeLa/0Y932v4qeGOeob1MdOPEeJ9ZqSxH5Rm6KcRRJo5qcTfykx6J1m8cjhGHIiKtEkJoKfSTs/Cv4ygmDJXMVZ2LWycLy5qstpKJfTy2IroMF3zwOOnQdZJR93AfuoBxjQi9oGGQWBb+Mps/7f+XX1WraZokh/ll/QsMmxisGkrgYwAAAABJRU5ErkJggg=='); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/d7b44705f92eaa9c63fd9472fa1c072a/8ac56/image-58.webp 240w,\n/static/d7b44705f92eaa9c63fd9472fa1c072a/d3be9/image-58.webp 480w,\n/static/d7b44705f92eaa9c63fd9472fa1c072a/b0a15/image-58.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/d7b44705f92eaa9c63fd9472fa1c072a/8ff5a/image-58.png 240w,\n/static/d7b44705f92eaa9c63fd9472fa1c072a/e85cb/image-58.png 480w,\n/static/d7b44705f92eaa9c63fd9472fa1c072a/0b533/image-58.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/d7b44705f92eaa9c63fd9472fa1c072a/0b533/image-58.png\"\n            alt=\"image-58.png\"\n            title=\"image-58.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>I’ll write about detailed usage in another article sometime.</p>\n<h3 id=\"kibana\" style=\"position:relative;\"><a href=\"#kibana\" aria-label=\"kibana permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Kibana</h3>\n<p>Kibana is a tool for visualizing data in conjunction with Elasticsearch.</p>\n<p>You can perform data analysis and graphical visualization in Kibana using data stored in Elasticsearch.</p>\n<p>In T-Pot, dashboards for visualizing information collected by each honeypot were created by default.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 495px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/63bb1a26b1151916ee75c350a40556c1/a4d88/image-61.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 121.25000000000001%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/63bb1a26b1151916ee75c350a40556c1/8ac56/image-61.webp 240w,\n/static/63bb1a26b1151916ee75c350a40556c1/d3be9/image-61.webp 480w,\n/static/63bb1a26b1151916ee75c350a40556c1/19998/image-61.webp 495w\"\n              sizes=\"(max-width: 495px) 100vw, 495px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/63bb1a26b1151916ee75c350a40556c1/8ff5a/image-61.png 240w,\n/static/63bb1a26b1151916ee75c350a40556c1/e85cb/image-61.png 480w,\n/static/63bb1a26b1151916ee75c350a40556c1/a4d88/image-61.png 495w\"\n            sizes=\"(max-width: 495px) 100vw, 495px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/63bb1a26b1151916ee75c350a40556c1/a4d88/image-61.png\"\n            alt=\"image-61.png\"\n            title=\"image-61.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Since I haven’t opened T-Pot to the internet yet, no data has been collected, but once I actually start operating the honeypot, I’ll basically be looking at the information on this dashboard.</p>\n<h3 id=\"security-meter\" style=\"position:relative;\"><a href=\"#security-meter\" aria-label=\"security meter permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Security Meter</h3>\n<p>Security Meter seems to be a tool that collects and visualizes information observed by a module called security sensors from Telekom, the German company that developed T-Pot.</p>\n<p>There are over 90 security sensors worldwide, and the information collected there is being used.</p>\n<p>Reference: <a href=\"https://www.telekom.com/en/media/media-information/archive/security-dashboard-shows-cyber-attacks-in-real-time-358884\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Security dashboard shows cyber attacks in real time | Deutsche Telekom</a></p>\n<p>You can also access it from the following link without a T-Pot environment.</p>\n<p>Reference: <a href=\"https://www.sicherheitstacho.eu/start/main\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Sicherheitstacho</a></p>\n<p>The UI looks so cool…</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/5b076765158fd46ca4455988a75b8496/0b533/image-60.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 71.66666666666667%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/5b076765158fd46ca4455988a75b8496/8ac56/image-60.webp 240w,\n/static/5b076765158fd46ca4455988a75b8496/d3be9/image-60.webp 480w,\n/static/5b076765158fd46ca4455988a75b8496/b0a15/image-60.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/5b076765158fd46ca4455988a75b8496/8ff5a/image-60.png 240w,\n/static/5b076765158fd46ca4455988a75b8496/e85cb/image-60.png 480w,\n/static/5b076765158fd46ca4455988a75b8496/0b533/image-60.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/5b076765158fd46ca4455988a75b8496/0b533/image-60.png\"\n            alt=\"image-60.png\"\n            title=\"image-60.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<h3 id=\"spiderfoot\" style=\"position:relative;\"><a href=\"#spiderfoot\" aria-label=\"spiderfoot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Spiderfoot</h3>\n<p>Spiderfoot is an OSS OSINT tool.</p>\n<p>Reference: <a href=\"https://www.spiderfoot.net/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Home - SpiderFoot</a></p>\n<p>It seems you can automate intelligent information gathering.</p>\n<p>For example, it seems you could automate intelligent analysis such as associating information like IP addresses collected by honeypots, email addresses, URLs, etc. with specific attack campaigns.</p>\n<p>Since I haven’t opened T-Pot to the internet yet and no data has been collected, I’ll try this once I start actual operation.</p>\n<h3 id=\"t-potgithub\" style=\"position:relative;\"><a href=\"#t-potgithub\" aria-label=\"t potgithub permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>T-Pot@Github</h3>\n<p>T-Pot’s GitHub repository is linked.</p>\n<p>Reference: <a href=\"https://github.com/telekom-security/tpotce\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">GitHub - telekom-security/tpotce:  T-Pot - The All In One Honeypot Platform </a></p>\n<h2 id=\"types-of-honeypots\" style=\"position:relative;\"><a href=\"#types-of-honeypots\" aria-label=\"types of honeypots permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Types of Honeypots</h2>\n<p>It’s quite detailed, but the overall picture of T-Pot looks like this.</p>\n<p><span\n      class=\"gatsby-resp-image-wrapper\"\n      style=\"position: relative; display: block; margin-left: auto; margin-right: auto; max-width: 500px; \"\n    >\n      <a\n    class=\"gatsby-resp-image-link\"\n    href=\"/static/aedf85215e335d38c43f4fce3389324c/0b533/image-62.png\"\n    style=\"display: block\"\n    target=\"_blank\"\n    rel=\"noopener\"\n  >\n    <span\n    class=\"gatsby-resp-image-background-image\"\n    style=\"padding-bottom: 45.416666666666664%; position: relative; bottom: 0; left: 0; background-image: url('data:image/png;base64,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'); background-size: cover; display: block;\"\n  ></span>\n  <picture>\n          <source\n              srcset=\"/static/aedf85215e335d38c43f4fce3389324c/8ac56/image-62.webp 240w,\n/static/aedf85215e335d38c43f4fce3389324c/d3be9/image-62.webp 480w,\n/static/aedf85215e335d38c43f4fce3389324c/b0a15/image-62.webp 500w\"\n              sizes=\"(max-width: 500px) 100vw, 500px\"\n              type=\"image/webp\"\n            />\n          <source\n            srcset=\"/static/aedf85215e335d38c43f4fce3389324c/8ff5a/image-62.png 240w,\n/static/aedf85215e335d38c43f4fce3389324c/e85cb/image-62.png 480w,\n/static/aedf85215e335d38c43f4fce3389324c/0b533/image-62.png 500w\"\n            sizes=\"(max-width: 500px) 100vw, 500px\"\n            type=\"image/png\"\n          />\n          <img\n            class=\"gatsby-resp-image-image\"\n            src=\"/static/aedf85215e335d38c43f4fce3389324c/0b533/image-62.png\"\n            alt=\"image-62.png\"\n            title=\"image-62.png\"\n            loading=\"lazy\"\n            style=\"width:100%;height:100%;margin:0;vertical-align:middle;position:absolute;top:0;left:0;\"\n          />\n        </picture>\n  </a>\n    </span></p>\n<p>Reference image: <a href=\"https://github.com/telekom-security/tpotce/blob/master/doc/architecture.png\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tpotce/architecture.png at master · telekom-security/tpotce</a></p>\n<p>The aforementioned tools and honeypots are each launched as containers managed by docker-compose.</p>\n<p>This image shows only 18 honeypots, but as of this article’s writing (2022/02/14), T-Pot has a total of 25 honeypots.</p>\n<p>Amazing.</p>\n<p>Since we’re here, let’s roughly look at what each honeypot is.</p>\n<h3 id=\"adbhoney\" style=\"position:relative;\"><a href=\"#adbhoney\" aria-label=\"adbhoney permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>ADBHoney</h3>\n<p>“ADBHoney” is a honeypot for <code class=\"language-text\">Android Debug Bridge (ADB)</code> over TCP/IP.</p>\n<p>Reference: <a href=\"https://github.com/huuck/ADBHoney\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">huuck/ADBHoney: Low interaction honeypot designed for Android Debug Bridge over TCP/IP</a></p>\n<p><code class=\"language-text\">Android Debug Bridge (ADB)</code> is a command-line tool that enables communication with Android devices.</p>\n<p>You can perform debugging by connecting from an ADB client to a daemon (<code class=\"language-text\">adbd</code>) running on an Android device.</p>\n<p>Reference: <a href=\"https://developer.android.com/studio/command-line/adb\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Android Debug Bridge (adb)  |  Android Developers</a></p>\n<p>Normally, ADB on devices is only done through protected communication, but if the ADB service port is exposed unprotected to the internet, the device accepts arbitrary code execution from malicious attackers over the internet.</p>\n<p>“ADBHoney” is a honeypot aimed at catching attacks targeting this open port <code class=\"language-text\">5555</code> with the purpose of downloading malware.</p>\n<h3 id=\"cisco-asa-honeypot\" style=\"position:relative;\"><a href=\"#cisco-asa-honeypot\" aria-label=\"cisco asa honeypot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cisco ASA honeypot</h3>\n<p>“Cisco ASA honeypot” is a honeypot that can detect attacks against <code class=\"language-text\">CVE-2018-0101</code>, which causes DoS and RCE.</p>\n<p>Reference: <a href=\"https://github.com/Cymmetria/ciscoasa_honeypot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Cymmetria/ciscoasa_honeypot: A low interaction honeypot for the Cisco ASA component capable of detecting CVE-2018-0101, a DoS and remote code execution vulnerability.</a></p>\n<p>It’s a vulnerability rated 10.0 in CVSSv3, and seems to be an exploitation of double-free.</p>\n<p>So there are also honeypots aimed only at collecting attacks against specific vulnerabilities.</p>\n<p>Reference: <a href=\"https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-0101\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">CVE - CVE-2018-0101</a></p>\n<p>Reference: <a href=\"https://jvndb.jvn.jp/ja/contents/2018/JVNDB-2018-001897.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">JVNDB-2018-001897 - JVN iPedia - Vulnerability Countermeasure Information Database</a></p>\n<h3 id=\"honepot-for-cve-2019-19781-citrix-adc\" style=\"position:relative;\"><a href=\"#honepot-for-cve-2019-19781-citrix-adc\" aria-label=\"honepot for cve 2019 19781 citrix adc permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Honepot for CVE-2019-19781 (Citrix ADC)</h3>\n<p>“Honepot for CVE-2019-19781 (Citrix ADC)” is also a honeypot targeting a specific vulnerability.</p>\n<p>It catches attacks aimed at exploiting <code class=\"language-text\">CVE-2019-19781</code>.</p>\n<p>Reference: <a href=\"https://github.com/MalwareTech/CitrixHoneypot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MalwareTech/CitrixHoneypot: Detect and log CVE-2019-19781 scan and exploitation attempts.</a></p>\n<p>This vulnerability also allows RCE through exploitation.</p>\n<p>It’s rated 9.8 in CVSSv3, and is a path traversal vulnerability.</p>\n<p>Reference: <a href=\"https://www.jpcert.or.jp/at/2020/at200003.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Alert Regarding Vulnerabilities in Multiple Citrix Products (CVE-2019-19781)</a></p>\n<p>Reference: <a href=\"https://jvndb.jvn.jp/ja/contents/2019/JVNDB-2019-013490.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">JVNDB-2019-013490 - JVN iPedia - Vulnerability Countermeasure Information Database</a></p>\n<h3 id=\"conpot\" style=\"position:relative;\"><a href=\"#conpot\" aria-label=\"conpot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>CONPOT</h3>\n<p>“CONPOT” is a honeypot for catching attacks against industrial facilities.</p>\n<p>It emulates complex infrastructure environments using common industrial control protocols.</p>\n<p>I don’t really understand how it’s done specifically, but it seems it can also intentionally delay responses to simulate an environment under certain load.</p>\n<p>Reference: <a href=\"http://conpot.org/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Conpot</a></p>\n<h3 id=\"cowrie\" style=\"position:relative;\"><a href=\"#cowrie\" aria-label=\"cowrie permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Cowrie</h3>\n<p>“Cowrie” seems to be able to monitor brute force attacks against SSH and Telnet, as well as attacker behavior after system intrusion.</p>\n<p>Reference: <a href=\"https://github.com/cowrie/cowrie\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cowrie/cowrie: Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io</a></p>\n<p>“Cowrie” can change what behavior it catches depending on the operation mode, but looking at T-Pot’s default configuration file, it seems SSH, Telnet, JSON format logging, etc. are all enabled.</p>\n<p>Reference: <a href=\"https://github.com/telekom-security/tpotce/blob/master/docker/cowrie/dist/cowrie.cfg\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">tpotce/cowrie.cfg at master · telekom-security/tpotce</a></p>\n<h3 id=\"ddospot\" style=\"position:relative;\"><a href=\"#ddospot\" aria-label=\"ddospot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>DDoSPot</h3>\n<p>“DDoSPot” is a honeypot for catching UDP-based DDoS attacks.</p>\n<p>It supports the following services:</p>\n<ul>\n<li>DNS server</li>\n<li>NTP server</li>\n<li>SSDP server</li>\n<li>CHARGEN server</li>\n<li>Random/mock UDP server</li>\n</ul>\n<p>Reference: <a href=\"https://github.com/aelth/ddospot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">aelth/ddospot: NTP, DNS, SSDP, Chargen and generic UDP-based amplification DDoS honeypot</a></p>\n<h3 id=\"dicompot\" style=\"position:relative;\"><a href=\"#dicompot\" aria-label=\"dicompot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Dicompot</h3>\n<p>“Dicompot” is a honeypot targeting <code class=\"language-text\">A Digital Imaging and Communications in Medicine (DICOM)</code>.</p>\n<p>Reference: <a href=\"https://github.com/nsmfoo/dicompot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">nsmfoo/dicompot: DICOM Honeypot</a></p>\n<p>DICOM seems to refer to the format of medical images taken with CT, MRI, CR, etc., and the communication protocol standards between medical imaging equipment that handles them.</p>\n<p>Reference: <a href=\"https://ja.wikipedia.org/wiki/DICOM\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DICOM - Wikipedia</a></p>\n<p>I heard about this standard for the first time, but port 104 is known as a common communication port, and attacks targeting this port have also been observed.</p>\n<h3 id=\"dionaea\" style=\"position:relative;\"><a href=\"#dionaea\" aria-label=\"dionaea permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Dionaea</h3>\n<p>“Dionaea” means Venus flytrap in Japanese, and is a honeypot aimed at collecting malware.</p>\n<p>Reference: <a href=\"https://github.com/DinoTools/dionaea\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">DinoTools/dionaea: Home of the dionaea honeypot</a></p>\n<p>Malware acquired by “Dionaea” seems to be saved in the <code class=\"language-text\">binaries</code> directory.</p>\n<p>Reference: <a href=\"https://qiita.com/micci184/items/fce32a6d62493d289710\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Collecting Malware with Honeypot Dionaea, Scanning with API, and Visualizing the Results - Qiita</a></p>\n<h3 id=\"elasticpot\" style=\"position:relative;\"><a href=\"#elasticpot\" aria-label=\"elasticpot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>ElasticPot</h3>\n<p>“ElasticPot” is a honeypot that emulates a vulnerable Elasticsearch server and captures attacks against Elasticsearch.</p>\n<p>Reference: <a href=\"https://gitlab.com/bontchev/elasticpot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Vesselin Bontchev / ElasticPot · GitLab</a></p>\n<h3 id=\"endlessh\" style=\"position:relative;\"><a href=\"#endlessh\" aria-label=\"endlessh permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Endlessh</h3>\n<p>“Endlessh” is an SSH tarpit.</p>\n<p>Reference: <a href=\"https://github.com/skeeto/endlessh\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">skeeto/endlessh: SSH tarpit that slowly sends an endless banner</a></p>\n<p>What is a “tarpit”, you ask? It’s a system aimed at wasting attackers’ time and resources by intentionally delaying server-side responses.</p>\n<p>Reference: <a href=\"https://eset-info.canon-its.jp/malware_info/term/detail/00070.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Tarpit | Cybersecurity Information Bureau</a></p>\n<p>“Endlessh” is an SSH tarpit that hangs attackers’ SSH clients and wastes up to several days of time.</p>\n<p>Reference: <a href=\"https://nullprogram.com/blog/2019/03/22/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Endlessh: an SSH Tarpit</a></p>\n<h3 id=\"glutton\" style=\"position:relative;\"><a href=\"#glutton\" aria-label=\"glutton permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Glutton</h3>\n<p>“Glutton” is a honeypot that functions as a proxy between attackers and other honeypots, and can capture and record attacker traffic using methods similar to MITM.</p>\n<p>Reference: <a href=\"https://github.com/mushorg/glutton\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">mushorg/glutton: Generic Low Interaction Honeypot</a></p>\n<p>Reference: <a href=\"https://cstayyab.medium.com/an-analysis-of-glutton-all-eating-honeypot-625adf70a33b\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">An analysis of Glutton — All Eating honeypot | by Muhammad Tayyab Sheikh (CS Tayyab) | Medium</a></p>\n<h3 id=\"heralding\" style=\"position:relative;\"><a href=\"#heralding\" aria-label=\"heralding permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Heralding</h3>\n<p>“Heralding” is a honeypot for capturing traffic and credentials when attackers attempt authentication.</p>\n<p>Reference: <a href=\"https://github.com/johnnykv/heralding\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">johnnykv/heralding: Credentials catching honeypot</a></p>\n<p>Using “Heralding”, you can capture authentication information used by attackers.</p>\n<p>Reference: <a href=\"https://sectechno.com/heralding-credentials-catching-honeypot/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Heralding - Credentials catching honeypot - SecTechno</a></p>\n<h3 id=\"hellpot\" style=\"position:relative;\"><a href=\"#hellpot\" aria-label=\"hellpot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>HellPot</h3>\n<p>“HellPot” is a honeypot based on <a href=\"https://github.com/carlmjohnson/heffalump\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Heffalump</a> that sends unlimited streams to malicious attackers, overflowing their memory and storage.</p>\n<p>Reference: <a href=\"https://github.com/yunginnanet/HellPot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">yunginnanet/HellPot: HellPot is a portal to endless suffering meant to punish unruly HTTP bots.</a></p>\n<p>It’s a different approach from SSH tarpit, but there are quite a few honeypots like this that are counter-traps against attackers.</p>\n<h3 id=\"honeypots\" style=\"position:relative;\"><a href=\"#honeypots\" aria-label=\"honeypots permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Honeypots</h3>\n<p>“Honeypots” is a honeypot that can monitor network traffic, BOT activity, and credential information used by attackers.</p>\n<p>“Honeypots” incorporates 23 different simple honeypots.</p>\n<p>Reference: <a href=\"https://github.com/qeeqbox/honeypots\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">qeeqbox/honeypots: 23 different honeypots in a single pypi package! (dns, ftp, httpproxy, http, https, imap, mysql, pop3, postgres, redis, smb, smtp, socks5, ssh, telnet, vnc, mssql, elastic, ldap, ntp, memcache, snmp, and oracle)</a></p>\n<p>This is the first pattern I’ve seen where multiple honeypots are embedded within a honeypot that’s part of T-Pot.</p>\n<h3 id=\"honeypy\" style=\"position:relative;\"><a href=\"#honeypy\" aria-label=\"honeypy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>HoneyPy</h3>\n<p>“HoneyPy” is a honeypot that can emulate TCP and UDP services and capture attacker activity.</p>\n<p>Reference: <a href=\"https://github.com/foospidy/HoneyPy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">foospidy/HoneyPy: A low to medium interaction honeypot.</a></p>\n<p>Reference: <a href=\"https://honeypy.readthedocs.io/en/latest/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Home - HoneyPy Docs</a></p>\n<p>By adding services in units called plugins, it seems you can capture attacks against TCP/UDP services such as DNS and Telnet.</p>\n<p>Reference: <a href=\"https://honeypy.readthedocs.io/en/latest/plugins/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Plugins - HoneyPy Docs</a></p>\n<h3 id=\"honeysap\" style=\"position:relative;\"><a href=\"#honeysap\" aria-label=\"honeysap permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>HoneySAP</h3>\n<p>“HoneySAP” is a honeypot for capturing attacks against SAP systems.</p>\n<p>Reference: <a href=\"https://github.com/SecureAuthCorp/HoneySAP\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">SecureAuthCorp/HoneySAP: HoneySAP: SAP Low-interaction research honeypot</a></p>\n<p>The documentation specifically states it can capture the purposes and techniques of attackers targeting SAP services.</p>\n<p>Reference: <a href=\"https://honeysap.readthedocs.io/en/latest/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">HoneySAP: SAP Low-interaction honeypot — HoneySAP 0.1.2 documentation</a></p>\n<h3 id=\"honeytrap\" style=\"position:relative;\"><a href=\"#honeytrap\" aria-label=\"honeytrap permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Honeytrap</h3>\n<p>“Honeytrap” emulates TCP and UDP services and captures attacker network traffic.</p>\n<p>Reference: <a href=\"https://github.com/armedpot/honeytrap/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">armedpot/honeytrap: Last download from git://git.carnivore.it/honeytrap.git of Honytrap by Tillmann Werner</a></p>\n<h3 id=\"ipp-honey\" style=\"position:relative;\"><a href=\"#ipp-honey\" aria-label=\"ipp honey permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>IPP Honey</h3>\n<p>“IPP Honey” is an <code class=\"language-text\">Internet Printing Protocol Honeypot</code>.</p>\n<p>Reference: <a href=\"https://gitlab.com/bontchev/ipphoney\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Vesselin Bontchev / IPP Honey · GitLab</a></p>\n<p>It emulates printers exposed to the internet and can capture attacks against printers.</p>\n<h3 id=\"log4pot\" style=\"position:relative;\"><a href=\"#log4pot\" aria-label=\"log4pot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Log4Pot</h3>\n<p>“Log4Pot” is a honeypot targeting the Log4Shell vulnerability “CVE-2021-44228”, which is currently having a major impact worldwide.</p>\n<p>Reference: <a href=\"https://github.com/thomaspatzke/Log4Pot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">thomaspatzke/Log4Pot: A honeypot for the Log4Shell vulnerability (CVE-2021-44228).</a></p>\n<p>This honeypot captures behavior related to Log4Shell exploitation.</p>\n<h3 id=\"mailoney\" style=\"position:relative;\"><a href=\"#mailoney\" aria-label=\"mailoney permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Mailoney</h3>\n<p>“Mailoney” is an SMTP honeypot.</p>\n<p>Reference: <a href=\"https://github.com/phin3has/mailoney\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">phin3has/mailoney: An SMTP Honeypot</a></p>\n<p>It can capture attacks against SMTP ports.</p>\n<h3 id=\"medpot\" style=\"position:relative;\"><a href=\"#medpot\" aria-label=\"medpot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>medpot</h3>\n<p>“medpot” seems to be an <code class=\"language-text\">HL7/FHIR honeypot</code>.</p>\n<p>Reference: <a href=\"https://github.com/schmalle/medpot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">schmalle/medpot: HL7 / FHIR honeypot</a></p>\n<p>I wondered what <code class=\"language-text\">HL7/FHIR</code> was, but it seems to be a communication protocol being standardized for medical information exchange.</p>\n<p>Reference: <a href=\"https://www.mhlw.go.jp/stf/newpage_15747.html\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">Research on HL7 FHIR</a></p>\n<p>As expected, the medical field is quite targeted.</p>\n<h3 id=\"rdpy\" style=\"position:relative;\"><a href=\"#rdpy\" aria-label=\"rdpy permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>RDPY</h3>\n<p>“RDPY” is a honeypot that implements Microsoft RDP in Python.</p>\n<p>Reference: <a href=\"https://github.com/citronneur/rdpy\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">citronneur/rdpy: Remote Desktop Protocol in Twisted Python</a></p>\n<h3 id=\"redishoneypot\" style=\"position:relative;\"><a href=\"#redishoneypot\" aria-label=\"redishoneypot permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>RedisHoneyPot</h3>\n<p>“RedisHoneyPot” is a honeypot targeting the Redis protocol.</p>\n<p>Reference: <a href=\"https://github.com/cypwnpwnsocute/RedisHoneyPot\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">cypwnpwnsocute/RedisHoneyPot: High Interaction Honeypot Solution for Redis protocol</a></p>\n<p>Written in Golang.</p>\n<h3 id=\"snare-and-tanner\" style=\"position:relative;\"><a href=\"#snare-and-tanner\" aria-label=\"snare and tanner permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>SNARE and TANNER</h3>\n<p>“SNARE” and “TANNER” are web application honeypot sensors.</p>\n<p>Reference: <a href=\"http://mushmush.org/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">MushMush</a></p>\n<p>“TANNER” seems to be a module that evaluates events captured by “SNARE” and determines how “SNARE” should respond to attackers.</p>\n<h2 id=\"summary\" style=\"position:relative;\"><a href=\"#summary\" aria-label=\"summary permalink\" class=\"anchor before\"><svg aria-hidden=\"true\" focusable=\"false\" height=\"16\" version=\"1.1\" viewBox=\"0 0 16 16\" width=\"16\"><path fill-rule=\"evenodd\" d=\"M4 9h1v1H4c-1.5 0-3-1.69-3-3.5S2.55 3 4 3h4c1.45 0 3 1.69 3 3.5 0 1.41-.91 2.72-2 3.25V8.59c.58-.45 1-1.27 1-2.09C10 5.22 8.98 4 8 4H4c-.98 0-2 1.22-2 2.5S3 9 4 9zm9-3h-1v1h1c1 0 2 1.22 2 2.5S13.98 12 13 12H9c-.98 0-2-1.22-2-2.5 0-.83.42-1.64 1-2.09V6.25c-1.09.53-2 1.84-2 3.25C6 11.31 7.55 13 9 13h4c1.45 0 3-1.69 3-3.5S14.5 6 13 6z\"></path></svg></a>Summary</h2>\n<p>For now, I’ve reviewed all the components of the latest version of T-Pot (as of 2022/02/15).</p>\n<p>I want to start actual operation soon, but there still seems to be a lot to do.</p>","fields":{"slug":"/honeypot-tpot-modules-en","tagSlugs":["/tag/security-en/","/tag/honey-pot-en/","/tag/azure-en/","/tag/備忘録/","/tag/english/"]},"frontmatter":{"date":"2022-02-16","description":"","tags":["Security (en)","HoneyPot (en)","Azure (en)","備忘録","English"],"title":"Continuing Adventures of a Novice Honeypotter Playing Safely with T-Pot [Investigating All T-Pot Modules]","socialImage":{"publicURL":"/static/c401b2f18052c899f8cdbf1869ca44e3/honeypot-tpot-modules.png"}}}},"pageContext":{"slug":"/honeypot-tpot-modules-en"}},"staticQueryHashes":["251939775","401334301","825871152"]}