Honeytrap 1.0.0 Released

Oct 29, 2007

Version 1.0.0 of the honeypot daemon Honeytrap has been released. It has a completely reworked configuration mechanism and new plugins.

The GPL'd program registers attacks against TCP services. When a request arrives from an unknown port, Honeytrap dynamically launches a server process to handle it. This avoids the need for the software to continually bind thousands of ports. Connection monitors based on Libpcap, Netfilter/Iptables or Netfilter_Queue handle the bindings. Honeytrap will run in various modes, including a proxy mode where it forwards connections and sniffs traffic. The daemon comprises two parts. The program core collects data and can load plugins at runtime for analysis purposes. Plugins currently available store strings and malware from attacks, and special extensions are available for identifying FTP and TFTP commands. In addition to this, there is a parser for attacks on VNC servers, a pluging that decodes Base 64 encoded exploits, and a module that identifies attacks heuristically using similarity checks. Honeytrap 1.0.0 is available as a source code archive on the Sourceforge download servers. The subversion repository for the project also supports access to the current sources. In addition to this, the download page has Xen templates and Qemu images for the virtual Honeytrap server.

Related content

comments powered by Disqus

Issue 270/2023

Buy this issue as a PDF

Digital Issue: Price $12.99
(incl. VAT)

Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Find SysAdmin Jobs