GithubHelp home page GithubHelp logo

honeypot-project's Introduction

OWASP Honeypot-Project

The goal of the OWASP Honeypot Project is to identify emerging attacks against web applications and report them to the community, in order to facilitate protection against such targeted attacks.

Based around the earlier OWASP/WASC Distributed Web Honeypots Project (https://github.com/SpiderLabs/owasp-distributed-web-honeypots)

The primary aims of the project are

  • Real-time, detailed Web Application Threat Attack Data
  • Threat Reports to the community

Organization of the repository

This repository is organized into various directories. Below table shows the purpose of each one.

Directory Purpose
honeytraps Focuses on building honeytraps and reporting threat intelligence
mds_elk Shows a PoC for sending the ModSecurity Audit Logs to ELK using Filebeat
misp-doc Assists in setting the MISP Server and creating threat events using PyMISP
mlogc_elk Shows a PoC for sending the ModSecurity Audit Logs to ELK using ModSecurity Audit Log Collector (mlogc)

Please go to respective directories for complete documentation.

Project Roadmap

As of August, 2018, the priorities for the next 6 months are:

  • Setup Proof of Concept to understand how ModSecurity baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes).
  • Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in MosSecurity Audit Console, WAF-FLE, Fluent and bespoke scripts for single and multiple probes.
  • Develop a mechanism to convert from stored MySQL to JSON format.
  • Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.
  • Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.
  • Provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project(https://www.misp-project.org) to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.
  • Consider new alternatives for log transfer including the use of MLOGC-NG or other possible approaches.
  • Develop a new VM based honeypot/probe based on CRS v3.1.
  • Develop new alternative small footprint honeypot/probe formats utilising Docker & Raspberry Pi.
  • Develop machine learning approach to automatically be able to update the rule set being used by the probe based on cyber threat intelligence received.

honeypot-project's People

Contributors

adrianwinckles avatar costis99 avatar dependabot[bot] avatar dextermallo avatar fzipi avatar gr3q avatar tulja avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

honeypot-project's Issues

Create module for CMSs

One of the problems for adoption is the lack of simple inclusion into well-known CMSs.
The idea is to provide a simple add-on/plugin/modules to include the functionality of semi-automatic configuration for the major CMSs: Wordpress, Joomla, Drupal.

The modules will:

  • provide a simple way for configuring the Honeypot data, e.g. Server, redirection, possible variables that will act as the honeypot
  • a way of inserting that variables at randon on the web interface
  • redirection to the Honeypot when this variable is modified

Logging alternatives

Consider new alternatives for log transfer including the use of:

  • MLOGC-NG
  • FileBeat (Logstash)
  • You name it..

Logstash Cant communication on 5044: Connection refuse

Hello,

I've Implemented honeypot project locally .
As soon as I trigger mod-sec rule. (by hitting curl request)
Python file start processing those rule but,
got this error.

ERROR	pipeline/output.go:100	Failed to connect to backoff(async(tcp://127.0.0.1:5044)): dial tcp 127.0.0.1:5044: connect: connection refused
modsec_app    | 2021-01-06T07:49:46.218Z	INFO	pipeline/output.go:93	Attempting to reconnect to backoff(async(tcp://127.0.0.1:5044)) with 3 reconnect attempt(s)

Any thoughts on this ?

my env file

LOGSTASH_HOST=127.0.0.1:5044

my filebeat.yml

output:
  logstash:
    enabled: true
    hosts: '${LOGSTASH_HOST:?must set LOGSTASH_HOST env variable}'
    timeout: 15
   

filebeat:
  inputs:
    -
      paths:
        - /var/log/modsec_audit_processed.log
      type: log
      json.keys_under_root: true
      json.add_error_key: true

my logstash.conf file

input {
  beats {
    port => 5044
    type => "mod_security"
    codec => json
    ssl => false
  }
}


output {
  elasticsearch {
    hosts => "elasticsearch:9200"
    manage_template => false
    index => "%{[@metadata][beat]}-%{+YYYY.MM.dd}"
    document_type => "%{[@metadata][type]}"
  }
  stdout { codec => rubydebug }
}

Evaluate console options

Evaluate console options to visualise threat data received from ModSecurity Honeypots/probes in:

  • ModSecurity Audit Console
  • WAF-FLE,
  • ELK?

Fluent and bespoke scripts for single and multiple probes.

Output logging to ELK

This is related to #2.

  • Develop a mechanism to convert from stored MySQL to JSON format.
  • Provide a mechanism to convert ModSecurity mlogc audit log output into JSON format.
  • Provide a mechanism to convert mlogc audit log output directly into ELK (ElasticSearch/Logstash/Kibana) to visualise the data.

Forward Threat Intelligence data

We need to provide a mechanism to forward honest output into threat intelligence format such as STIX using something like the MISP project to share Threat data coming from the Honeypots making it easy to export/import data from formats such as STIX and TAXII., may require use of concurrent logs in a format that MISP can deal with.

PoC: undestand and document the flow from ModSecurity to the console

We need a Proof of Concept to understand how ModSecurity baed Honeypot/Probe interacts with a receiving console (develop a VM and/or Docker based test solution to store logs from multiple probes)

  • Install modsecurity stack
  • Send logs/probes to console
  • Write documentation for the process

Lists of feature and optimisation requirements

initiatives

The project has been idle for a while. The issue will be created as a root ticket to gather new items (including some of the old tickets) which are going to be implemented.

Items

  • [FEAT] Develop alternative small-footprint honeypot/probe formats.
  • [FEAT] pluggable modules #9
  • [OPT] Consider new alternatives for log transfer approaches. #6
  • [OPT] The project structure may be a little confusing for individuals to run it. Consider refactoring the structure of the docker-compose file, the folder structure, and the README file.
  • [FIX] images cannot work correctly in some OS (e.g., MacOS) because it does not specify the version.

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.