tpotce/README.md

579 lines
34 KiB
Markdown
Raw Normal View History

2019-02-19 11:52:43 +00:00
# T-Pot 19.03
2014-11-28 16:57:47 +00:00
2019-02-15 12:19:42 +00:00
T-Pot 19.03 runs on Debian (Sid), is based heavily on
2015-12-08 14:47:39 +00:00
2017-09-06 15:51:18 +00:00
[docker](https://www.docker.com/), [docker-compose](https://docs.docker.com/compose/)
2015-03-04 20:51:34 +00:00
2016-03-11 10:10:37 +00:00
and includes dockerized versions of the following honeypots
2015-03-04 20:51:34 +00:00
* [adbhoney](https://github.com/huuck/ADBHoney),
2018-08-09 15:35:33 +00:00
* [ciscoasa](https://github.com/Cymmetria/ciscoasa_honeypot),
2016-03-11 10:10:37 +00:00
* [conpot](http://conpot.org/),
* [cowrie](https://github.com/cowrie/cowrie),
2016-03-11 10:10:37 +00:00
* [dionaea](https://github.com/DinoTools/dionaea),
* [elasticpot](https://github.com/schmalle/ElasticpotPY),
2018-08-09 15:35:33 +00:00
* [glutton](https://github.com/mushorg/glutton),
* [heralding](https://github.com/johnnykv/heralding),
2019-03-19 12:55:14 +00:00
* [honeypy](https://github.com/foospidy/HoneyPy),
2017-09-06 15:51:18 +00:00
* [honeytrap](https://github.com/armedpot/honeytrap/),
* [mailoney](https://github.com/awhitehatter/mailoney),
2018-11-23 22:30:25 +00:00
* [medpot](https://github.com/schmalle/medpot),
2018-08-10 16:12:14 +00:00
* [rdpy](https://github.com/citronneur/rdpy),
2018-08-09 15:35:33 +00:00
* [snare](http://mushmush.org/),
2018-11-23 22:30:25 +00:00
* [tanner](http://mushmush.org/)
2017-09-06 15:51:18 +00:00
2015-03-05 07:36:59 +00:00
2016-03-11 10:10:37 +00:00
Furthermore we use the following tools
2018-08-09 15:35:33 +00:00
* [Cockpit](https://cockpit-project.org/running) for a lightweight, webui for docker, os, real-time performance monitoring and web terminal.
* [Cyberchef](https://gchq.github.io/CyberChef/) a web app for encryption, encoding, compression and data analysis.
2016-03-11 10:10:37 +00:00
* [ELK stack](https://www.elastic.co/videos) to beautifully visualize all the events captured by T-Pot.
2016-10-26 14:07:05 +00:00
* [Elasticsearch Head](https://mobz.github.io/elasticsearch-head/) a web front end for browsing and interacting with an Elastic Search cluster.
2019-06-04 14:33:02 +00:00
* [Fatt](https://github.com/0x4D31/fatt) a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic.
2017-09-06 15:51:18 +00:00
* [Spiderfoot](https://github.com/smicallef/spiderfoot) a open source intelligence automation tool.
2016-10-26 14:07:05 +00:00
* [Suricata](http://suricata-ids.org/) a Network Security Monitoring engine.
2016-03-11 10:10:37 +00:00
# TL;DR
2018-08-09 15:35:33 +00:00
1. Meet the [system requirements](#requirements). The T-Pot installation needs at least 6-8 GB RAM and 128 GB free disk space as well as a working internet connection.
2017-09-06 15:51:18 +00:00
2. Download the T-Pot ISO from [GitHub](https://github.com/dtag-dev-sec/tpotce/releases) or [create it yourself](#createiso).
2016-03-11 10:10:37 +00:00
3. Install the system in a [VM](#vm) or on [physical hardware](#hw) with [internet access](#placement).
2018-08-10 16:12:14 +00:00
4. Enjoy your favorite beverage - [watch](https://sicherheitstacho.eu) and [analyze](#kibana).
2018-01-12 16:43:26 +00:00
2016-03-11 10:10:37 +00:00
# Table of Contents
- [Changelog](#changelog)
- [Technical Concept](#concept)
- [System Requirements](#requirements)
- [Installation](#installation)
- [Prebuilt ISO Image](#prebuilt)
- [Create your own ISO Image](#createiso)
- [Running in a VM](#vm)
- [Running on Hardware](#hardware)
2018-11-28 09:40:28 +00:00
- [Post Install User](#postinstall)
2018-11-27 09:15:40 +00:00
- [Post Install Auto](#postinstallauto)
2019-05-09 22:42:30 +00:00
- [Cloud Deployments](#cloud)
- [Ansible Deployment on Open Telekom Cloud](#ansible-otc)
2016-03-11 10:10:37 +00:00
- [First Run](#firstrun)
- [System Placement](#placement)
2018-11-27 09:15:40 +00:00
- [Updates](#updates)
2016-03-11 10:10:37 +00:00
- [Options](#options)
2016-10-26 14:07:05 +00:00
- [SSH and web access](#ssh)
2016-03-11 10:10:37 +00:00
- [Kibana Dashboard](#kibana)
2016-10-28 16:09:33 +00:00
- [Tools](#tools)
2016-03-11 10:10:37 +00:00
- [Maintenance](#maintenance)
- [Community Data Submission](#submission)
2019-04-01 07:56:06 +00:00
- [Opt-In HPFEEDS Data Submission](#hpfeeds-optin)
2016-03-11 10:10:37 +00:00
- [Roadmap](#roadmap)
- [Disclaimer](#disclaimer)
- [FAQ](#faq)
- [Contact](#contact)
- [Licenses](#licenses)
- [Credits](#credits)
- [Stay tuned](#staytuned)
2019-02-22 15:35:10 +00:00
- [Testimonial](#testimonial)
2016-03-11 10:10:37 +00:00
- [Fun Fact](#funfact)
2018-08-09 15:35:33 +00:00
<a name="changelog"></a>
2019-02-19 11:52:43 +00:00
# Release Notes
- **Move from Ubuntu 18.04 to Debian (Sid)**
2019-02-19 13:00:41 +00:00
- For almost 5 years Ubuntu LTS versions were our distributions of choice. Last year we made a design choice for T-Pot to be closer to a rolling release model and thus allowing us to issue smaller changes and releases in a more timely manner. The distribution of choice is Debian (Sid / unstable) which will provide us with the latest advancements in a Debian based distribution.
2019-03-19 12:55:14 +00:00
- **Include HoneyPy honeypot**
- *HoneyPy* is now included in the NEXTGEN installation type
- **Include Suricata 4.1.3**
- Building *Suricata 4.1.3* from scratch to enable JA3 and overall better protocol support.
2019-03-19 12:55:14 +00:00
- **Update tools to the latest versions**
- ELK Stack 6.6.2
- CyberChef 8.27.0
- SpiderFoot v3.0
- Cockpit 188
2019-03-28 11:27:50 +00:00
- NGINX is now built to enforce TLS 1.3 on the T-Pot WebUI
2019-03-19 12:55:14 +00:00
- **Update honeypots**
2019-03-28 11:27:50 +00:00
- Where possible / feasible the honeypots have been updated to their latest versions.
- *Cowrie* now supports *HASSH* generated hashes which allows for an easier identification of an attacker accross IP adresses.
- *Heralding* now supports *SOCKS5* emulation.
- **Update Dashboards & Visualizations**
- *Offset Dashboard* added to easily spot changes in attacks on a single dashboard in 24h time window.
- *Cowrie Dashboard* modified to integrate *HASSH* support / visualizations.
- *HoneyPy Dashboard* added to support latest honeypot addition.
- *Suricata Dashboard* modified to integrate *JA3* support / visualizations.
2019-04-01 12:43:24 +00:00
- **Debian mirror selection**
- During base install you now have to manually select a mirror.
2019-04-01 16:22:45 +00:00
- Upon T-Pot install the mirror closest to you will be determined automatically, `netselect-apt` requires you to allow ICMP outbound.
2019-04-01 12:43:24 +00:00
- This solves peering problems for most of the users speeding up installation and updates.
2019-03-28 11:27:50 +00:00
- **Bugs**
- Fixed issue #298 where the import and export of objects on the shell did not work.
- Fixed issue #313 where Spiderfoot raised a KeyError, which was previously fixed in upstream.
- Fixed error in Suricata where path for reference.config changed.
2019-03-19 12:55:14 +00:00
- **Release Cycle**
- As far as possible we will integrate changes now faster into the master branch, eliminating the need for monolithic releases. The update feature will be continuously improved on that behalf. However this might not account for all feature changes.
2019-04-01 07:56:06 +00:00
- **HPFEEDS Opt-In**
- If you want to share your T-Pot data with a 3rd party HPFEEDS broker such as [SISSDEN](https://sissden.eu) you can do so by creating an account at the SISSDEN portal and run `hpfeeds_optin.sh` on T-Pot.
2017-10-06 10:09:33 +00:00
- **Update Feature**
2019-02-20 22:21:47 +00:00
- For the ones who like to live on the bleeding edge of T-Pot development there is now an update script available in `/opt/tpot/update.sh`.
2019-02-19 13:00:41 +00:00
- This feature is beta and is mostly intended to provide you with the latest development advances without the need of reinstalling T-Pot.
2019-03-19 12:55:14 +00:00
- **Deprecated tools**
- *ctop* will no longer be part of T-Pot.
2019-04-04 08:26:33 +00:00
- **Fix #332**
- If T-Pot, opposed to the requirements, does not have full internet access netselect-apt fails to determine the fastest mirror as it needs ICMP and UDP outgoing. Should netselect-apt fail the default mirrors will be used.
- **Improve install speed with apt-fast**
- Migrating from a stable base install to Debian (Sid) requires downloading lots of packages. Depending on your geo location the download speed was already improved by introducing netselect-apt to determine the fastest mirror. Wit
h apt-fast the downloads will be even faster by downloading packages not only in parallel but also with multiple connections per package.
2019-04-21 11:29:44 +00:00
- **Added Ansible T-Pot Deployment on Open Telekom Cloud**
- Reusable Ansible Playbooks for all cloud providers
- Example Showcase with our Open Telekom Cloud
2019-05-16 09:22:13 +00:00
- **HPFEEDS Opt-In commandline option**
- Pass a hpfeeds config file as a commandline argument
- hpfeeds config is saved in `/data/ews/conf/hpfeeds.cfg`
- Update script restores hpfeeds config
2017-10-06 10:09:33 +00:00
2016-03-11 10:10:37 +00:00
<a name="concept"></a>
# Technical Concept
2019-02-19 11:52:43 +00:00
T-Pot is based on the network installer Debian (Stretch). During installation the whole system will be updated to Debian (Sid).
2017-09-18 21:01:34 +00:00
The honeypot daemons as well as other support components being used have been containerized using [docker](http://docker.io).
This allows us to run multiple honeypot daemons on the same network interface while maintaining a small footprint and constrain each honeypot within its own environment.
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
In T-Pot we combine the dockerized honeypots ...
* [adbhoney](https://github.com/huuck/ADBHoney),
2018-08-10 16:12:14 +00:00
* [ciscoasa](https://github.com/Cymmetria/ciscoasa_honeypot),
* [conpot](http://conpot.org/),
* [cowrie](http://www.micheloosterhof.com/cowrie/),
* [dionaea](https://github.com/DinoTools/dionaea),
* [elasticpot](https://github.com/schmalle/ElasticPot),
* [glutton](https://github.com/mushorg/glutton),
* [heralding](https://github.com/johnnykv/heralding),
2019-03-20 15:50:46 +00:00
* [honeypy](https://github.com/foospidy/HoneyPy),
2018-08-10 16:12:14 +00:00
* [honeytrap](https://github.com/armedpot/honeytrap/),
* [mailoney](https://github.com/awhitehatter/mailoney),
2018-11-23 22:30:25 +00:00
* [medpot](https://github.com/schmalle/medpot),
2018-08-10 16:12:14 +00:00
* [rdpy](https://github.com/citronneur/rdpy),
* [snare](http://mushmush.org/),
2018-11-23 22:30:25 +00:00
* [tanner](http://mushmush.org/)
2018-08-10 16:12:14 +00:00
... with the following tools ...
* [Cockpit](https://cockpit-project.org/running) for a lightweight, webui for docker, os, real-time performance monitoring and web terminal.
* [Cyberchef](https://gchq.github.io/CyberChef/) a web app for encryption, encoding, compression and data analysis.
* [ELK stack](https://www.elastic.co/videos) to beautifully visualize all the events captured by T-Pot.
* [Elasticsearch Head](https://mobz.github.io/elasticsearch-head/) a web front end for browsing and interacting with an Elastic Search cluster.
2019-06-04 14:33:02 +00:00
* [Fatt](https://github.com/0x4D31/fatt) a pyshark based script for extracting network metadata and fingerprints from pcap files and live network traffic.
2018-08-10 16:12:14 +00:00
* [Spiderfoot](https://github.com/smicallef/spiderfoot) a open source intelligence automation tool.
* [Suricata](http://suricata-ids.org/) a Network Security Monitoring engine.
2019-02-20 22:21:47 +00:00
... to give you the best out-of-the-box experience possible and an easy-to-use multi-honeypot appliance.
2016-03-11 10:10:37 +00:00
2018-08-13 10:47:27 +00:00
![Architecture](doc/architecture.png)
2016-03-11 10:10:37 +00:00
2019-02-19 11:52:43 +00:00
While data within docker containers is volatile we do ensure a default 30 day persistence of all relevant honeypot and tool data in the well known `/data` folder and sub-folders. The persistence configuration may be adjusted in `/opt/tpot/etc/logrotate/logrotate.conf`. Once a docker container crashes, all other data produced within its environment is erased and a fresh instance is started from the corresponding docker image.<br>
2016-03-11 10:10:37 +00:00
Basically, what happens when the system is booted up is the following:
2015-03-05 07:36:59 +00:00
2016-03-11 10:10:37 +00:00
- start host system
2018-08-10 16:12:14 +00:00
- start all the necessary services (i.e. cockpit, docker, etc.)
- start all docker containers via docker-compose (honeypots, nms, elk, etc.)
Within the T-Pot project, we provide all the tools and documentation necessary to build your own honeypot system and contribute to our [Sicherheitstacho](https://sicherheitstacho.eu).
The source code and configuration files are fully stored in the T-Pot GitHub repository. The docker images are pre-configured for the T-Pot environment. If you want to run the docker images separately, make sure you study the docker-compose configuration (`/opt/tpot/etc/tpot.yml`) and the T-Pot systemd script (`/etc/systemd/system/tpot.service`), as they provide a good starting point for implementing changes.
The individual docker configurations are located in the [docker folder](https://github.com/dtag-dev-sec/tpotce/tree/master/docker).
2016-03-11 10:10:37 +00:00
<a name="requirements"></a>
# System Requirements
Depending on your installation type, whether you install on [real hardware](#hardware) or in a [virtual machine](#vm), make sure your designated T-Pot system meets the following requirements:
##### Standard Installation
2019-03-19 12:55:14 +00:00
- Honeypots: adbhoney, ciscoasa, conpot, cowrie, dionaea, elasticpot, heralding, honeytrap, mailoney, medpot, rdpy, snare & tanner
2018-08-10 16:12:14 +00:00
- Tools: cockpit, cyberchef, ELK, elasticsearch head, ewsposter, NGINX, spiderfoot, p0f and suricata
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
- 6-8 GB RAM (less RAM is possible but might introduce swapping)
- 128 GB SSD (smaller is possible but limits the capacity of storing events)
2016-02-04 09:44:34 +00:00
- Network via DHCP
2017-09-18 21:01:34 +00:00
- A working, non-proxied, internet connection
2016-02-04 09:44:34 +00:00
2018-08-10 16:12:14 +00:00
##### Sensor Installation
2019-03-19 12:55:14 +00:00
- Honeypots: adbhoney, ciscoasa, conpot, cowrie, dionaea, elasticpot, heralding, honeytrap, mailoney, medpot, rdpy, snare & tanner
2018-08-10 16:12:14 +00:00
- Tools: cockpit
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
- 6-8 GB RAM (less RAM is possible but might introduce swapping)
- 128 GB SSD (smaller is possible but limits the capacity of storing events)
2015-03-05 07:36:59 +00:00
- Network via DHCP
2017-09-18 21:01:34 +00:00
- A working, non-proxied, internet connection
2015-03-05 07:36:59 +00:00
2018-08-10 16:12:14 +00:00
##### Industrial Installation
2019-03-19 12:55:14 +00:00
- Honeypots: conpot, cowrie, heralding, medpot, rdpy
2018-08-10 16:12:14 +00:00
- Tools: cockpit, cyberchef, ELK, elasticsearch head, ewsposter, NGINX, spiderfoot, p0f and suricata
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
- 6-8 GB RAM (less RAM is possible but might introduce swapping)
- 128 GB SSD (smaller is possible but limits the capacity of storing events)
2016-02-19 16:52:45 +00:00
- Network via DHCP
2017-09-18 21:01:34 +00:00
- A working, non-proxied, internet connection
2016-02-19 16:52:45 +00:00
2018-08-10 16:12:14 +00:00
##### Collector Installation (because sometimes all you want to do is catching credentials)
- Honeypots: heralding
- Tools: cockpit, cyberchef, ELK, elasticsearch head, ewsposter, NGINX, spiderfoot, p0f and suricata
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
- 6-8 GB RAM (less RAM is possible but might introduce swapping)
- 128 GB SSD (smaller is possible but limits the capacity of storing events)
- Network via DHCP
- A working, non-proxied, internet connection
2019-03-19 12:55:14 +00:00
##### NextGen Installation (Glutton replacing Honeytrap, HoneyPy replacing Elasticpot)
- Honeypots: adbhoney, ciscoasa, conpot, cowrie, dionaea, glutton, heralding, honeypy, mailoney, rdpy, snare & tanner
2019-06-04 14:33:02 +00:00
- Tools: cockpit, cyberchef, ELK, elasticsearch head, ewsposter, fatt, NGINX, spiderfoot, p0f and suricata
2018-08-10 16:12:14 +00:00
- 6-8 GB RAM (less RAM is possible but might introduce swapping)
- 128 GB SSD (smaller is possible but limits the capacity of storing events)
2016-02-19 16:52:45 +00:00
- Network via DHCP
2017-09-18 21:01:34 +00:00
- A working, non-proxied, internet connection
2016-02-19 16:52:45 +00:00
2016-03-11 10:10:37 +00:00
<a name="installation"></a>
# Installation
2017-09-18 21:01:34 +00:00
The installation of T-Pot is straight forward and heavily depends on a working, transparent and non-proxied up and running internet connection. Otherwise the installation **will fail!**
2016-03-11 10:10:37 +00:00
2019-02-19 11:52:43 +00:00
Firstly, decide if you want to download our prebuilt installation ISO image from [GitHub](https://github.com/dtag-dev-sec/tpotce/releases), [create it yourself](#createiso) ***or*** [post-install on an existing Debian 9.7 (Stretch)](#postinstall).
2016-03-11 10:10:37 +00:00
Secondly, decide where you want to let the system run: [real hardware](#hardware) or in a [virtual machine](#vm)?
<a name="prebuilt"></a>
## Prebuilt ISO Image
2016-10-26 14:07:05 +00:00
We provide an installation ISO image for download (~50MB), which is created using the same [tool](https://github.com/dtag-dev-sec/tpotce) you can use yourself in order to create your own image. It will basically just save you some time downloading components and creating the ISO image.
2017-09-18 21:01:34 +00:00
You can download the prebuilt installation image from [GitHub](https://github.com/dtag-dev-sec/tpotce/releases) and jump to the [installation](#vm) section.
2016-03-11 10:10:37 +00:00
<a name="createiso"></a>
## Create your own ISO Image
For transparency reasons and to give you the ability to customize your install, we provide you the [ISO Creator](https://github.com/dtag-dev-sec/tpotce) that enables you to create your own ISO installation image.
**Requirements to create the ISO image:**
2019-02-19 11:52:43 +00:00
- Debian 9.7 or newer as host system (others *may* work, but *remain* untested)
2016-03-11 10:10:37 +00:00
- 4GB of free memory
- 32GB of free storage
- A working internet connection
**How to create the ISO image:**
1. Clone the repository and enter it.
2017-09-18 21:01:34 +00:00
```
git clone https://github.com/dtag-dev-sec/tpotce
cd tpotce
```
2016-03-11 10:10:37 +00:00
2. Invoke the script that builds the ISO image.
2016-10-26 14:07:05 +00:00
The script will download and install dependencies necessary to build the image on the invoking machine. It will further download the ubuntu network installer image (~50MB) which T-Pot is based on.
2017-09-18 21:01:34 +00:00
```
sudo ./makeiso.sh
```
2017-10-06 10:09:33 +00:00
After a successful build, you will find the ISO image `tpot.iso` along with a SHA256 checksum `tpot.sha256` in your directory.
2016-03-11 10:10:37 +00:00
<a name="vm"></a>
## Running in VM
You may want to run T-Pot in a virtualized environment. The virtual system configuration depends on your virtualization provider.
We successfully tested T-Pot with [VirtualBox](https://www.virtualbox.org) and [VMWare](http://www.vmware.com) with just little modifications to the default machine configurations.
2018-08-10 16:12:14 +00:00
It is important to make sure you meet the [system requirements](#requirements) and assign a virtual harddisk and RAM according to the requirements while making sure networking is bridged.
2016-03-11 10:10:37 +00:00
2017-09-18 21:01:34 +00:00
You need to enable promiscuous mode for the network interface for suricata and p0f to work properly. Make sure you enable it during configuration.
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
If you want to use a wifi card as a primary NIC for T-Pot, please be aware of the fact that not all network interface drivers support all wireless cards. E.g. in VirtualBox, you then have to choose the *"MT SERVER"* model of the NIC.
2016-03-11 10:10:37 +00:00
2016-03-11 12:17:36 +00:00
Lastly, mount the `tpot.iso` ISO to the VM and continue with the installation.<br>
2016-03-11 10:10:37 +00:00
You can now jump [here](#firstrun).
<a name="hardware"></a>
## Running on Hardware
If you decide to run T-Pot on dedicated hardware, just follow these steps:
1. Burn a CD from the ISO image or make a bootable USB stick using the image. <br>
Whereas most CD burning tools allow you to burn from ISO images, the procedure to create a bootable USB stick from an ISO image depends on your system. There are various Windows GUI tools available, e.g. [this tip](http://www.ubuntu.com/download/desktop/create-a-usb-stick-on-windows) might help you.<br> On [Linux](http://askubuntu.com/questions/59551/how-to-burn-a-iso-to-a-usb-device) or [MacOS](http://www.ubuntu.com/download/desktop/create-a-usb-stick-on-mac-osx) you can use the tool *dd* or create the USB stick with T-Pot's [ISO Creator](https://github.com/dtag-dev-sec).
2. Boot from the USB stick and install.
2019-02-19 11:52:43 +00:00
*Please note*: While we are performing limited tests with the Intel NUC platform other hardware platforms **remain untested**. We can not provide hardware support of any kind.
2018-08-10 16:12:14 +00:00
<a name="postinstall"></a>
2018-11-28 09:40:28 +00:00
## Post-Install User
2019-02-19 11:52:43 +00:00
In some cases it is necessary to install Debian 9.7 (Stretch) on your own:
2018-11-27 09:15:40 +00:00
- Cloud provider does not offer mounting ISO images.
- Hardware setup needs special drivers and / or kernels.
- Within your company you have to setup special policies, software etc.
- You just like to stay on top of things.
2018-08-10 16:12:14 +00:00
2019-02-19 11:52:43 +00:00
The T-Pot Universal Installer will upgrade the system to Debian (Sid) and install all required T-Pot dependencies.
2018-08-10 16:12:14 +00:00
2018-11-23 22:30:25 +00:00
Just follow these steps:
2018-08-10 16:12:14 +00:00
```
git clone https://github.com/dtag-dev-sec/tpotce
cd tpotce/iso/installer/
./install.sh --type=user
```
The installer will now start and guide you through the install process.
2018-11-27 09:15:40 +00:00
<a name="postinstallauto"></a>
## Post-Install Auto
2019-02-20 22:21:47 +00:00
You can also let the installer run automatically if you provide your own `tpot.conf`. An example is available in `tpotce/iso/installer/tpot.conf.dist`. This should make things easier in case you want to automate the installation i.e. with **Ansible**.
2018-11-27 09:15:40 +00:00
Just follow these steps while adjusting `tpot.conf` to your needs:
```
git clone https://github.com/dtag-dev-sec/tpotce
cd tpotce/iso/installer/
cp tpot.conf.dist tpot.conf
./install.sh --type=auto --conf=tpot.conf
```
The installer will start automatically and guide you through the install process.
2016-03-11 10:10:37 +00:00
2019-05-09 22:42:30 +00:00
<a name="cloud"></a>
## Cloud Deployments
Located in the [`cloud`](cloud) folder.
Currently there is an example with Ansible.
If you would like to contribute you can add other cloud deployments like Terraform, Chef or Puppet.
2019-04-21 11:29:44 +00:00
<a name="ansible-otc"></a>
2019-05-09 22:42:30 +00:00
### Ansible Deployment on Open Telekom Cloud
You can find an Ansible Playbook based automated T-Pot Deployment in the [`cloud/open-telekom-cloud`](cloud/open-telekom-cloud) folder.
The Playbooks in the [`cloud/open-telekom-cloud/ansible`](cloud/open-telekom-cloud/ansible) folder are reusable across all cloud providers (like AWS, Azure, Digital Ocean).
The [`deploy_ansible_otc_t-pot.sh`](cloud/open-telekom-cloud/deploy_ansible_otc_t-pot.sh) script is an example of how it works with our own Public Cloud Offering [Open Telekom Cloud](https://open-telekom-cloud.com/en).
2019-04-21 11:29:44 +00:00
It first creates a new Elastic Cloud Server via the Open Telekom Cloud API and then invokes the Ansible Playbooks to install and configure T-Pot.
You can have a look at the script and easily adapt it for other cloud providers.
2016-03-11 10:10:37 +00:00
<a name="firstrun"></a>
## First Run
2018-08-10 16:12:14 +00:00
The installation requires very little interaction, only a locale and keyboard setting have to be answered for the basic linux installation. The system will reboot and please maintain the active internet connection. The T-Pot installer will start and ask you for an installation type, password for the **tsec** user and credentials for a **web user**. Everything else will be configured automatically. All docker images and other componenents will be downloaded. Depending on your network connection and the chosen installation type, the installation may take some time. During our tests (250Mbit down, 40Mbit up), the installation was usually finished within a 15-30 minute timeframe.
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
Once the installation is finished, the system will automatically reboot and you will be presented with the T-Pot login screen. On the console you may login with:
2016-03-11 10:10:37 +00:00
2018-11-27 09:15:40 +00:00
- user: **[tsec or user]** *you chose during one of the post install methods*
- pass: **[password]** *you chose during the installation*
2016-10-26 14:07:05 +00:00
All honeypot services are preconfigured and are starting automatically.
2015-03-05 07:36:59 +00:00
2018-08-10 16:12:14 +00:00
You can login from your browser and access the Admin UI: `https://<your.ip>:64294` or via SSH to access the command line: `ssh -l tsec -p 64295 <your.ip>`
2016-10-26 14:07:05 +00:00
2018-11-27 09:15:40 +00:00
- user: **[tsec or user]** *you chose during one of the post install methods*
- pass: **[password]** *you chose during the installation*
2018-08-10 16:12:14 +00:00
You can also login from your browser and access the Web UI: `https://<your.ip>:64297`
2018-11-27 09:15:40 +00:00
- user: **[user]** *you chose during the installation*
- pass: **[password]** *you chose during the installation*
2015-03-05 07:36:59 +00:00
2016-03-02 16:31:07 +00:00
2016-03-11 10:10:37 +00:00
<a name="placement"></a>
# System Placement
2019-02-19 11:52:43 +00:00
Make sure your system is reachable through a network you suspect intruders in / from (i.e. the internet). Otherwise T-Pot will most likely not capture any attacks, other than the ones from your internal network! We recommend you put it in an unfiltered zone, where all TCP and UDP traffic is forwarded to T-Pot's network interface. However to avoid fingerprinting you can put T-Pot behind a firewall and forward all TCP / UDP traffic in the port range of 1-64000 to T-Pot while allowing access to ports > 64000 only from trusted IPs.
2016-03-11 10:10:37 +00:00
2017-09-18 21:01:34 +00:00
A list of all relevant ports is available as part of the [Technical Concept](#concept)
2016-03-11 10:10:37 +00:00
<br>
Basically, you can forward as many TCP ports as you want, as honeytrap dynamically binds any TCP port that is not covered by the other honeypot daemons.
2018-08-10 16:12:14 +00:00
In case you need external Admin UI access, forward TCP port 64294 to T-Pot, see below.
2016-03-11 10:10:37 +00:00
In case you need external SSH access, forward TCP port 64295 to T-Pot, see below.
2018-08-10 16:12:14 +00:00
In case you need external Web UI access, forward TCP port 64297 to T-Pot, see below.
2016-03-11 10:10:37 +00:00
2019-02-19 11:52:43 +00:00
T-Pot requires outgoing git, http, https connections for updates (Debian, Docker, GitHub, PyPi) and attack submission (ewsposter, hpfeeds). Ports and availability may vary based on your geographical location.
2016-03-11 10:10:37 +00:00
2018-11-27 09:15:40 +00:00
<a name="updates"></a>
# Updates
For the ones of you who want to live on the bleeding edge of T-Pot development we introduced an update feature which will allow you to update all T-Pot relevant files to be up to date with the T-Pot master branch.
**If you made any relevant changes to the T-Pot relevant config files make sure to create a backup first.**
2019-05-16 09:11:40 +00:00
2019-04-25 11:18:02 +00:00
The Update script will:
2019-05-16 09:11:40 +00:00
- **mercilessly** overwrite local changes to be in sync with the T-Pot master branch
2019-02-19 11:52:43 +00:00
- upgrade the system to the packages available in Debian (Sid)
- update all resources to be in-sync with the T-Pot master branch
- ensure all T-Pot relevant system files will be patched / copied into the original T-Pot state
2019-05-16 09:11:40 +00:00
- restore your custom ews.cfg and HPFEED settings from `/data/ews/conf`
2018-11-27 09:15:40 +00:00
You simply run the update script:
```
2019-06-04 17:52:58 +00:00
sudo su -
2018-11-27 09:15:40 +00:00
cd /opt/tpot/
./update.sh -y
```
**Despite all our efforts please be reminded that updates sometimes may have unforeseen consequences. Please create a backup of the machine or the files with the most value to your work.**
2016-03-11 10:10:37 +00:00
<a name="options"></a>
# Options
2018-08-10 16:12:14 +00:00
The system is designed to run without any interaction or maintenance and automatically contributes to the community.<br>
2016-03-11 10:10:37 +00:00
We know, for some this may not be enough. So here come some ways to further inspect the system and change configuration parameters.
<a name="ssh"></a>
2016-10-26 14:07:05 +00:00
## SSH and web access
2018-08-10 16:12:14 +00:00
By default, the SSH daemon allows access on **tcp/64295** with a user / password combination and prevents credential brute forcing attempts using `fail2ban`. This also counts for Admin UI (**tcp/64294**) and Web UI (**tcp/64297**) access.<br>
2016-03-11 10:10:37 +00:00
2018-08-10 16:12:14 +00:00
If you do not have a SSH client at hand and still want to access the machine via command line you can do so by accessing the Admin UI from `https://<your.ip>:64294`, enter
2016-03-11 10:10:37 +00:00
2018-11-27 09:15:40 +00:00
- user: **[tsec or user]** *you chose during one of the post install methods*
- pass: **[password]** *you chose during the installation*
2016-03-11 10:10:37 +00:00
2018-08-13 10:47:27 +00:00
![Cockpit Terminal](doc/cockpit3.png)
2016-10-28 16:09:33 +00:00
2016-03-11 10:10:37 +00:00
<a name="kibana"></a>
## Kibana Dashboard
2018-08-10 16:12:14 +00:00
Just open a web browser and connect to `https://<your.ip>:64297`, enter
2016-03-11 10:10:37 +00:00
2018-11-27 09:15:40 +00:00
- user: **[user]** *you chose during the installation*
- pass: **[password]** *you chose during the installation*
2016-03-11 10:10:37 +00:00
2017-09-18 21:01:34 +00:00
and **Kibana** will automagically load. The Kibana dashboard can be customized to fit your needs. By default, we haven't added any filtering, because the filters depend on your setup. E.g. you might want to filter out your incoming administrative ssh connections and connections to update servers.
2016-03-11 10:10:37 +00:00
2018-08-13 10:47:27 +00:00
![Dashbaord](doc/kibana.png)
2016-03-11 10:10:37 +00:00
2016-10-28 16:09:33 +00:00
<a name="tools"></a>
## Tools
We included some web based management tools to improve and ease up on your daily tasks.
2018-08-13 10:47:27 +00:00
![Cockpit Overview](doc/cockpit1.png)
2018-11-23 22:30:25 +00:00
2018-08-13 10:47:27 +00:00
![Cockpit Containers](doc/cockpit2.png)
2018-11-23 22:30:25 +00:00
2018-08-13 10:47:27 +00:00
![Cyberchef](doc/cyberchef.png)
2018-11-23 22:30:25 +00:00
2018-08-13 10:54:10 +00:00
![ES Head Plugin](doc/headplugin.png)
2018-11-23 22:30:25 +00:00
2018-08-13 10:54:10 +00:00
![Spiderfoot](doc/spiderfoot.png)
2017-09-18 21:01:34 +00:00
2016-10-28 16:09:33 +00:00
2016-03-11 10:10:37 +00:00
<a name="maintenance"></a>
## Maintenance
2018-11-23 22:30:25 +00:00
As mentioned before, the system is designed to be low maintenance. Basically, there is nothing you have to do but let it run.
2016-03-11 10:10:37 +00:00
2017-09-18 21:01:34 +00:00
If you run into any problems, a reboot may fix it :bowtie:
2016-03-11 10:10:37 +00:00
If new versions of the components involved appear, we will test them and build new docker images. Those new docker images will be pushed to docker hub and downloaded to T-Pot and activated accordingly.
<a name="submission"></a>
## Community Data Submission
2019-02-19 21:32:12 +00:00
We provide T-Pot in order to make it accessible to all parties interested in honeypot deployment. By default, the captured data is submitted to a community backend. This community backend uses the data to feed [Sicherheitstacho](https://sicherheitstacho.eu).
2018-08-10 16:12:14 +00:00
You may opt out of the submission by removing the `# Ewsposter service` from `/opt/tpot/etc/tpot.yml`:
2017-09-18 21:01:34 +00:00
1. Stop T-Pot services: `systemctl stop tpot`
2017-10-06 10:09:33 +00:00
2. Remove Ewsposter service: `vi /opt/tpot/etc/tpot.yml`
2017-09-18 21:01:34 +00:00
3. Remove the following lines, save and exit vi (`:x!`):<br>
```
# Ewsposter service
ewsposter:
container_name: ewsposter
restart: always
networks:
- ewsposter_local
image: "dtagdevsec/ewsposter:1903"
2017-09-18 21:01:34 +00:00
volumes:
- /data:/data
- /data/ews/conf/ews.ip:/opt/ewsposter/ews.ip
```
4. Start T-Pot services: `systemctl start tpot`
2016-03-11 10:10:37 +00:00
Data is submitted in a structured ews-format, a XML stucture. Hence, you can parse out the information that is relevant to you.
We encourage you not to disable the data submission as it is the main purpose of the community approach - as you all know **sharing is caring** 😍
2019-04-01 07:56:06 +00:00
<a name="hpfeeds-optin"></a>
## Opt-In HPFEEDS Data Submission
2019-05-16 09:11:40 +00:00
As an Opt-In it is now possible to also share T-Pot data with 3rd party HPFEEDS brokers, such as [SISSDEN](https://sissden.eu).
If you want to share your T-Pot data you simply have to register an account with a 3rd party broker with its own benefits towards the community. Once registered you will receive your credentials to share events with the broker. In T-Pot you simply run `hpfeeds_optin.sh` which will ask for your credentials, in case of SISSDEN this is just `Ident` and `Secret`, everything else is pre-configured.
It will automatically update `/opt/tpot/etc/tpot.yml` to deliver events to your desired broker.
The script can accept a config file as an argument, e.g. `./hpfeeds_optin.sh --conf=hpfeeds.cfg`
Your current config will also be stored in `/data/ews/conf/hpfeeds.cfg` where you can review or change it.
2019-05-16 09:50:25 +00:00
Be sure to apply any changes by running `./hpfeeds_optin.sh --conf=/data/ews/conf/hpfeeds.cfg`.
No worries: You old config gets backed up in `/data/ews/conf/hpfeeds.cfg.old`
2019-05-16 09:11:40 +00:00
2019-05-16 09:28:03 +00:00
Of course you can also rerun the `hpfeeds_optin.sh` script to change and apply your settings interactively.
2019-03-20 15:50:46 +00:00
2016-03-11 10:10:37 +00:00
<a name="roadmap"></a>
# Roadmap
As with every development there is always room for improvements ...
Some features may be provided with updated docker images, others may require some hands on from your side.
You are always invited to participate in development on our [GitHub](https://github.com/dtag-dev-sec/tpotce) page.
<a name="disclaimer"></a>
# Disclaimer
- We don't have access to your system. So we cannot remote-assist when you break your configuration. But you can simply reinstall.
- The software was designed with best effort security, not to be in stealth mode. Because then, we probably would not be able to provide those kind of honeypot services.
- You install and you run within your responsibility. Choose your deployment wisely as a system compromise can never be ruled out.
2018-08-10 16:12:14 +00:00
- Honeypots should - by design - may not host any sensitive data. Make sure you don't add any.
2016-03-11 10:10:37 +00:00
- By default, your data is submitted to the community dashboard. You can disable this in the config. But hey, wouldn't it be better to contribute to the community?
<a name="faq"></a>
# FAQ
Please report any issues or questions on our [GitHub issue list](https://github.com/dtag-dev-sec/tpotce/issues), so the community can participate.
<a name="contact"></a>
# Contact
We provide the software **as is** in a Community Edition format. T-Pot is designed to run out of the box and with zero maintenance involved. <br>
We hope you understand that we cannot provide support on an individual basis. We will try to address questions, bugs and problems on our [GitHub issue list](https://github.com/dtag-dev-sec/tpotce/issues).
<a name="licenses"></a>
# Licenses
2017-09-18 21:01:34 +00:00
The software that T-Pot is built on uses the following licenses.
2019-03-19 12:55:14 +00:00
<br>GPLv2: [conpot](https://github.com/mushorg/conpot/blob/master/LICENSE.txt), [dionaea](https://github.com/DinoTools/dionaea/blob/master/LICENSE), [honeypy](https://github.com/foospidy/HoneyPy/blob/master/LICENSE), [honeytrap](https://github.com/armedpot/honeytrap/blob/master/LICENSE), [suricata](http://suricata-ids.org/about/open-source/)
2019-06-04 14:33:02 +00:00
<br>GPLv3: [adbhoney](https://github.com/huuck/ADBHoney), [elasticpot](https://github.com/schmalle/ElasticPot), [ewsposter](https://github.com/dtag-dev-sec/ews/), [fatt](https://github.com/0x4D31/fatt/blob/master/LICENSE), [rdpy](https://github.com/citronneur/rdpy/blob/master/LICENSE), [heralding](https://github.com/johnnykv/heralding/blob/master/LICENSE.txt), [snare](https://github.com/mushorg/snare/blob/master/LICENSE), [tanner](https://github.com/mushorg/snare/blob/master/LICENSE)
2018-08-13 10:47:27 +00:00
<br>Apache 2 License: [cyberchef](https://github.com/gchq/CyberChef/blob/master/LICENSE), [elasticsearch](https://github.com/elasticsearch/elasticsearch/blob/master/LICENSE.txt), [logstash](https://github.com/elasticsearch/logstash/blob/master/LICENSE), [kibana](https://github.com/elasticsearch/kibana/blob/master/LICENSE.md), [docker](https://github.com/docker/docker/blob/master/LICENSE), [elasticsearch-head](https://github.com/mobz/elasticsearch-head/blob/master/LICENCE)
2019-02-19 11:52:43 +00:00
<br>MIT license: [ciscoasa](https://github.com/Cymmetria/ciscoasa_honeypot/blob/master/LICENSE), [glutton](https://github.com/mushorg/glutton/blob/master/LICENSE)
<br> Other: [cowrie](https://github.com/micheloosterhof/cowrie/blob/master/LICENSE.md), [mailoney](https://github.com/awhitehatter/mailoney), [Debian licensing](https://www.debian.org/legal/licenses/)
2016-03-11 10:10:37 +00:00
<a name="credits"></a>
# Credits
2019-02-19 11:52:43 +00:00
Without open source and the fruitful development community (we are proud to be a part of), T-Pot would not have been possible! Our thanks are extended but not limited to the following people and organizations:
2016-03-11 10:10:37 +00:00
2017-09-18 21:01:34 +00:00
### The developers and development communities of
2016-03-11 10:10:37 +00:00
* [adbhoney](https://github.com/huuck/ADBHoney/graphs/contributors)
2019-04-04 08:36:35 +00:00
* [apt-fast](https://github.com/ilikenwf/apt-fast/graphs/contributors)
2018-08-13 10:47:27 +00:00
* [ciscoasa](https://github.com/Cymmetria/ciscoasa_honeypot/graphs/contributors)
* [cockpit](https://github.com/cockpit-project/cockpit/graphs/contributors)
2016-03-11 10:10:37 +00:00
* [conpot](https://github.com/mushorg/conpot/graphs/contributors)
* [cowrie](https://github.com/micheloosterhof/cowrie/graphs/contributors)
2019-03-20 15:50:46 +00:00
* [debian](http://www.debian.org/)
2016-03-11 10:10:37 +00:00
* [dionaea](https://github.com/DinoTools/dionaea/graphs/contributors)
* [docker](https://github.com/docker/docker/graphs/contributors)
* [elasticpot](https://github.com/schmalle/ElasticpotPY/graphs/contributors)
2016-03-11 10:10:37 +00:00
* [elasticsearch](https://github.com/elastic/elasticsearch/graphs/contributors)
2016-10-26 14:07:05 +00:00
* [elasticsearch-head](https://github.com/mobz/elasticsearch-head/graphs/contributors)
2016-03-11 10:10:37 +00:00
* [ewsposter](https://github.com/armedpot/ewsposter/graphs/contributors)
2019-06-04 14:33:02 +00:00
* [fatt](https://github.com/0x4D31/fatt/graphs/contributors)
2018-08-13 10:47:27 +00:00
* [glutton](https://github.com/mushorg/glutton/graphs/contributors)
* [heralding](https://github.com/johnnykv/heralding/graphs/contributors)
2019-03-19 12:55:14 +00:00
* [honeypy](https://github.com/foospidy/HoneyPy/graphs/contributors)
2016-03-11 10:10:37 +00:00
* [honeytrap](https://github.com/armedpot/honeytrap/graphs/contributors)
* [kibana](https://github.com/elastic/kibana/graphs/contributors)
* [logstash](https://github.com/elastic/logstash/graphs/contributors)
2017-09-18 21:01:34 +00:00
* [mailoney](https://github.com/awhitehatter/mailoney)
2018-11-23 22:30:25 +00:00
* [medpot](https://github.com/schmalle/medpot/graphs/contributors)
2016-03-11 10:10:37 +00:00
* [p0f](http://lcamtuf.coredump.cx/p0f3/)
2017-09-18 21:01:34 +00:00
* [rdpy](https://github.com/citronneur/rdpy)
* [spiderfoot](https://github.com/smicallef/spiderfoot)
2018-08-13 10:47:27 +00:00
* [snare](https://github.com/mushorg/snare/graphs/contributors)
* [tanner](https://github.com/mushorg/tanner/graphs/contributors)
2016-03-11 10:10:37 +00:00
* [suricata](https://github.com/inliniac/suricata/graphs/contributors)
2017-09-18 21:01:34 +00:00
### The following companies and organizations
2019-02-19 11:52:43 +00:00
* [debian](https://www.debian.org/)
2016-03-11 10:10:37 +00:00
* [docker](https://www.docker.com/)
* [elastic.io](https://www.elastic.co/)
* [honeynet project](https://www.honeynet.org/)
2016-10-26 14:07:05 +00:00
* [intel](http://www.intel.com)
2016-03-11 10:10:37 +00:00
### ... and of course ***you*** for joining the community!
<a name="staytuned"></a>
# Stay tuned ...
2017-09-18 21:01:34 +00:00
We will be releasing a new version of T-Pot about every 6-12 months.
2016-03-03 16:45:49 +00:00
2019-02-22 15:35:10 +00:00
<a name="testimonial"></a>
# Testimonial
One of the greatest feedback we have gotten so far is by one of the Conpot developers:<br>
***"[...] I highly recommend T-Pot which is ... it's not exactly a swiss army knife .. it's more like a swiss army soldier, equipped with a swiss army knife. Inside a tank. A swiss tank. [...]"***
2016-03-11 10:10:37 +00:00
<a name="funfact"></a>
# Fun Fact
2015-03-05 07:36:59 +00:00
2019-03-19 12:55:14 +00:00
In an effort of saving the environment we are now brewing our own Mate Ice Tea and consumed 73 liters so far for the T-Pot 19.03 development 😇