mirror of
https://github.com/telekom-security/tpotce.git
synced 2025-07-03 13:32:13 +00:00
Update README.md
This commit is contained in:
parent
b65be28e10
commit
c17ddc7e60
1 changed files with 35 additions and 65 deletions
100
README.md
100
README.md
|
@ -2,22 +2,24 @@
|
||||||
|
|
||||||
## Table of Contents
|
## Table of Contents
|
||||||
1. [Introduction](#introduction)
|
1. [Introduction](#introduction)
|
||||||
1.1[Features and Benefits](#features-and-benefits)
|
1. [Features and Benefits](#features-and-benefits)
|
||||||
1.2. [Architecture](#architecture)
|
2. [Architecture](#architecture)
|
||||||
1.3. [Supported Honeypots](#supported-honeypots)
|
3. [Supported Honeypots](#supported-honeypots)
|
||||||
1.4. [Tools Included](#tools-included)
|
4. [Tools Included](#tools-included)
|
||||||
2. [MacOs Installation](#macos-installation)
|
2. [MacOs Installation](#macos-installation)
|
||||||
|
1. [Required Ports](#required-ports)
|
||||||
|
2. [Uninstall T-Pot](#uninstall-tpot)
|
||||||
3. [Data Analysis and Insights](#data-analysis-and-insights)
|
3. [Data Analysis and Insights](#data-analysis-and-insights)
|
||||||
4. [Conclusion](#conclusion)
|
4. [Conclusion](#conclusion)
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
## Introduction
|
## 1. Introduction
|
||||||
**T-Pot** is an all-in-one honeypot platform designed by Deutsche Telekom. It supports multi-architectures (amd64, arm64) and offers a wide range of visualization options using the **Elastic Stack**, real-time animated attack maps, and numerous security tools to enhance the deception experience. 🍯
|
**T-Pot** is an all-in-one honeypot platform designed by Deutsche Telekom. It supports multi-architectures (amd64, arm64) and offers a wide range of visualization options using the **Elastic Stack**, real-time animated attack maps, and numerous security tools to enhance the deception experience. 🍯
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Features and Benefits
|
### 1.1 Features and Benefits
|
||||||
T-Pot provides several key features that make it a powerful tool for cybersecurity professionals and researchers:
|
T-Pot provides several key features that make it a powerful tool for cybersecurity professionals and researchers:
|
||||||
|
|
||||||
- **Comprehensive Honeypot Integration**: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors.
|
- **Comprehensive Honeypot Integration**: T-Pot combines over 20 honeypots, each designed to capture different types of malicious activity. This integration allows for monitoring and analyzing a wide variety of attack vectors.
|
||||||
|
@ -34,20 +36,20 @@ T-Pot provides several key features that make it a powerful tool for cybersecuri
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Architecture
|
### 1.2 Architecture
|
||||||
The core components of T-Pot have been moved into a Docker image called **tpotinit**. This change has made T-Pot compatible with multiple Linux distributions, macOS, and Windows (with some limitations due to Docker Desktop). T-Pot uses **Docker** and **Docker Compose** to run as many honeypots and tools as possible simultaneously, maximizing the host's hardware utilization.
|
The core components of T-Pot have been moved into a Docker image called **tpotinit**. This change has made T-Pot compatible with multiple Linux distributions, macOS, and Windows (with some limitations due to Docker Desktop). T-Pot uses **Docker** and **Docker Compose** to run as many honeypots and tools as possible simultaneously, maximizing the host's hardware utilization.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Supported Honeypots
|
### 1.3 Supported Honeypots
|
||||||
T-Pot supports a wide range of honeypots, including:
|
T-Pot supports a wide range of honeypots, including:
|
||||||
|
|
||||||
#### Industrial and Medical Honeypots
|
#### 1.3.1 Industrial and Medical Honeypots
|
||||||
1. **Conpot**: Simulates Industrial Control Systems (ICS) and protocols like Modbus, SNMP, and S7comm.
|
1. **Conpot**: Simulates Industrial Control Systems (ICS) and protocols like Modbus, SNMP, and S7comm.
|
||||||
2. **Dicompot**: Emulates medical imaging systems (DICOM) to detect attacks on medical devices.
|
2. **Dicompot**: Emulates medical imaging systems (DICOM) to detect attacks on medical devices.
|
||||||
3. **Medpot**: Simulates medical data management systems, focusing on healthcare sector attacks.
|
3. **Medpot**: Simulates medical data management systems, focusing on healthcare sector attacks.
|
||||||
|
|
||||||
#### Network and IoT Honeypots
|
#### 1.3.2 Network and IoT Honeypots
|
||||||
1. **Adbhoney**: Simulates Android devices exposed via the ADB (Android Debug Bridge) protocol.
|
1. **Adbhoney**: Simulates Android devices exposed via the ADB (Android Debug Bridge) protocol.
|
||||||
2. **Ciscoasa**: Emulates Cisco ASA devices to detect attacks on firewalls and VPNs.
|
2. **Ciscoasa**: Emulates Cisco ASA devices to detect attacks on firewalls and VPNs.
|
||||||
3. **Citrixhoneypot**: Simulates known Citrix vulnerabilities, such as CVE-2019-19781.
|
3. **Citrixhoneypot**: Simulates known Citrix vulnerabilities, such as CVE-2019-19781.
|
||||||
|
@ -55,29 +57,29 @@ T-Pot supports a wide range of honeypots, including:
|
||||||
5. **Endlessh**: Simulates an SSH server that keeps connections open indefinitely, slowing down network scanners.
|
5. **Endlessh**: Simulates an SSH server that keeps connections open indefinitely, slowing down network scanners.
|
||||||
6. **Ipphoney**: Emulates IPP (Internet Printing Protocol) services to detect attacks on network printers.
|
6. **Ipphoney**: Emulates IPP (Internet Printing Protocol) services to detect attacks on network printers.
|
||||||
|
|
||||||
#### Web and Application Honeypots
|
#### 1.3.3 Web and Application Honeypots
|
||||||
1. **Cowrie**: Emulates SSH and Telnet servers to capture brute-force attempts and malicious commands.
|
1. **Cowrie**: Emulates SSH and Telnet servers to capture brute-force attempts and malicious commands.
|
||||||
2. **Hellpot**: Simulates vulnerable HTTP servers to capture "log4shell" attacks (CVE-2021-44228).
|
2. **Hellpot**: Simulates vulnerable HTTP servers to capture "log4shell" attacks (CVE-2021-44228).
|
||||||
|
|
||||||
#### DDoS and Anomaly Detection Honeypots
|
#### 1.3.4 DDoS and Anomaly Detection Honeypots
|
||||||
1. **Ddospot**: Detects and analyzes DDoS attacks by simulating vulnerable services.
|
1. **Ddospot**: Detects and analyzes DDoS attacks by simulating vulnerable services.
|
||||||
2. **Honeytrap**: Monitors network traffic and dynamically launches honeypots based on incoming requests.
|
2. **Honeytrap**: Monitors network traffic and dynamically launches honeypots based on incoming requests.
|
||||||
|
|
||||||
#### Email and Communication Honeypots
|
#### 1.3.5 Email and Communication Honeypots
|
||||||
1. **Mailoney**: Emulates SMTP servers to capture spam and phishing attempts.
|
1. **Mailoney**: Emulates SMTP servers to capture spam and phishing attempts.
|
||||||
2. **Heralding**: Simulates authentication services (e.g., SSH, FTP) to capture stolen credentials.
|
2. **Heralding**: Simulates authentication services (e.g., SSH, FTP) to capture stolen credentials.
|
||||||
|
|
||||||
#### Malware and Advanced Analysis Honeypots
|
#### 1.3.6 Malware and Advanced Analysis Honeypots
|
||||||
1. **Beelzebub**: Analyzes malware by emulating vulnerable services.
|
1. **Beelzebub**: Analyzes malware by emulating vulnerable services.
|
||||||
2. **Snare / Tanner**: Snare captures interactions, while Tanner analyzes attacker behavior.
|
2. **Snare / Tanner**: Snare captures interactions, while Tanner analyzes attacker behavior.
|
||||||
|
|
||||||
#### Data Traps and Advanced Deception Honeypots
|
#### 1.3.7 Data Traps and Advanced Deception Honeypots
|
||||||
1. **Elasticpot**: Simulates an unprotected Elasticsearch server, often targeted for data breaches.
|
1. **Elasticpot**: Simulates an unprotected Elasticsearch server, often targeted for data breaches.
|
||||||
2. **H0neytr4p**: A generic honeypot for capturing interactions with exposed services.
|
2. **H0neytr4p**: A generic honeypot for capturing interactions with exposed services.
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Tools Included
|
### 1.4 Tools Included
|
||||||
T-Pot also includes the following tools:
|
T-Pot also includes the following tools:
|
||||||
- **Autoheal**: Automatically restarts containers with failed health checks.
|
- **Autoheal**: Automatically restarts containers with failed health checks.
|
||||||
- **CyberChef**: A web app for encryption, encoding, compression, and data analysis.
|
- **CyberChef**: A web app for encryption, encoding, compression, and data analysis.
|
||||||
|
@ -91,29 +93,7 @@ T-Pot also includes the following tools:
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
### Data Analysis and Insights
|
## 2. MacOs Installation
|
||||||
Recent studies, such as one conducted by **Jiuma Elhshik**, have demonstrated T-Pot's effectiveness in collecting and analyzing threat data. Over 48 hours, T-Pot captured **126,833 attacks**, providing valuable insights into current threat landscapes. Key findings include:
|
|
||||||
|
|
||||||
1. **Most Targeted Honeypots**:
|
|
||||||
- **Dionaea**: Over 47,000 attacks, primarily targeting SMB (port 445).
|
|
||||||
- **DDospot**: Specialized in detecting DDoS attacks.
|
|
||||||
- **Honeytrap**: Attracted a wide range of attacks.
|
|
||||||
|
|
||||||
2. **Geographical Origin of Attacks**:
|
|
||||||
- Most attacks originated from the **United States** and **China**, with significant activity from **Iran** and the **Netherlands**. Note that IP spoofing may obscure true origins.
|
|
||||||
|
|
||||||
3. **Exploited Vulnerabilities**:
|
|
||||||
- **CVE-2023-50387 (KeyTrap)**: Targets DNS servers.
|
|
||||||
- **CVE-2023-46604**: A deserialization vulnerability in Apache ActiveMQ.
|
|
||||||
|
|
||||||
4. **Attack Techniques**:
|
|
||||||
- Brute-force attempts on SSH and Telnet services.
|
|
||||||
- Use of backdoors like **DoublePulsar**.
|
|
||||||
- Detection of malware such as **Hajime**, a worm known for creating botnets.
|
|
||||||
|
|
||||||
---
|
|
||||||
|
|
||||||
## macOS & Windows
|
|
||||||
Sometimes it is just nice if you can spin up a T-Pot instance on macOS or Windows, i.e. for development, testing or just the fun of it. As Docker Desktop is rather limited not all honeypot types or T-Pot features are supported. Also remember, by default the macOS and Windows firewall are blocking access from remote, so testing is limited to the host. For production it is recommended to run T-Pot on [Linux](#choose-your-distro).<br>
|
Sometimes it is just nice if you can spin up a T-Pot instance on macOS or Windows, i.e. for development, testing or just the fun of it. As Docker Desktop is rather limited not all honeypot types or T-Pot features are supported. Also remember, by default the macOS and Windows firewall are blocking access from remote, so testing is limited to the host. For production it is recommended to run T-Pot on [Linux](#choose-your-distro).<br>
|
||||||
To get things up and running just follow these steps:
|
To get things up and running just follow these steps:
|
||||||
1. Install Docker Desktop for [macOS](https://docs.docker.com/desktop/install/mac-install/) or [Windows](https://docs.docker.com/desktop/install/windows-install/).
|
1. Install Docker Desktop for [macOS](https://docs.docker.com/desktop/install/mac-install/) or [Windows](https://docs.docker.com/desktop/install/windows-install/).
|
||||||
|
@ -122,17 +102,13 @@ To get things up and running just follow these steps:
|
||||||
4. Copy `cp compose/mac_win.yml ./docker-compose.yml`
|
4. Copy `cp compose/mac_win.yml ./docker-compose.yml`
|
||||||
5. Create a `WEB_USER` by running `~/tpotce/genuser.sh` (macOS) or `~/tpotce/genuserwin.ps1` (Windows)
|
5. Create a `WEB_USER` by running `~/tpotce/genuser.sh` (macOS) or `~/tpotce/genuserwin.ps1` (Windows)
|
||||||
6. Adjust the `.env` file by changing `TPOT_OSTYPE=linux` to either `mac` or `win`:
|
6. Adjust the `.env` file by changing `TPOT_OSTYPE=linux` to either `mac` or `win`:
|
||||||
```
|
|
||||||
# OSType (linux, mac, win)
|
|
||||||
# Most docker features are available on linux
|
|
||||||
TPOT_OSTYPE=mac
|
|
||||||
```
|
|
||||||
7. You have to ensure on your own there are no port conflicts keeping T-Pot from starting up.
|
7. You have to ensure on your own there are no port conflicts keeping T-Pot from starting up.
|
||||||
8. Start T-Pot: `docker compose up` or `docker compose up -d` if you want T-Pot to run in the background.
|
8. Start T-Pot: `docker compose up` or `docker compose up -d` if you want T-Pot to run in the background.
|
||||||
9. Stop T-Pot: `CTRL-C` (it if was running in the foreground) and / or `docker compose down -v` to stop T-Pot entirely.
|
9. Stop T-Pot: `CTRL-C` (it if was running in the foreground) and / or `docker compose down -v` to stop T-Pot entirely.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Required Ports
|
### 2.1 Required Ports
|
||||||
Besides the ports generally needed by the OS, i.e. obtaining a DHCP lease, DNS, etc. T-Pot will require the following ports for incoming / outgoing connections. Review the [T-Pot Architecture](#technical-architecture) for a visual representation. Also some ports will show up as duplicates, which is fine since used in different editions.
|
Besides the ports generally needed by the OS, i.e. obtaining a DHCP lease, DNS, etc. T-Pot will require the following ports for incoming / outgoing connections. Review the [T-Pot Architecture](#technical-architecture) for a visual representation. Also some ports will show up as duplicates, which is fine since used in different editions.
|
||||||
|
|
||||||
| Port | Protocol | Direction | Description |
|
| Port | Protocol | Direction | Description |
|
||||||
|
@ -159,28 +135,22 @@ Besides the ports generally needed by the OS, i.e. obtaining a DHCP lease, DNS,
|
||||||
| 80, 443, 8080, 8443 | tcp | incoming | Honeypot: Galah (LLM required) |
|
| 80, 443, 8080, 8443 | tcp | incoming | Honeypot: Galah (LLM required) |
|
||||||
| 8080 | tcp | incoming | Honeypot: Go-pot |
|
| 8080 | tcp | incoming | Honeypot: Go-pot |
|
||||||
| 80, 443 | tcp | incoming | Honeypot: H0neytr4p |
|
| 80, 443 | tcp | incoming | Honeypot: H0neytr4p |
|
||||||
| 21, 22, 23, 25, 80, 110, 143, 443, 993, 995, 1080, 5432, 5900 | tcp | incoming | Honeypot: Heralding |
|
| 4444 | tcp | incoming | Honeypot: Mailoney |
|
||||||
| 3000 | tcp | incoming | Honeypot: Honeyaml |
|
|
||||||
| 21, 22, 23, 25, 80, 110, 143, 389, 443, 445, 631, 1080, 1433, 1521, 3306, 3389, 5060, 5432, 5900, 6379, 6667, 8080, 9100, 9200, 11211 | tcp | incoming | Honeypot: qHoneypots |
|
|
||||||
| 53, 123, 161, 5060 | udp | incoming | Honeypot: qHoneypots |
|
|
||||||
| 631 | tcp | incoming | Honeypot: IPPHoney |
|
|
||||||
| 80, 443, 8080, 9200, 25565 | tcp | incoming | Honeypot: Log4Pot |
|
|
||||||
| 25 | tcp | incoming | Honeypot: Mailoney |
|
|
||||||
| 2575 | tcp | incoming | Honeypot: Medpot |
|
|
||||||
| 9100 | tcp | incoming | Honeypot: Miniprint |
|
|
||||||
| 6379 | tcp | incoming | Honeypot: Redishoneypot |
|
|
||||||
| 5060 | tcp/udp | incoming | Honeypot: SentryPeer |
|
|
||||||
| 80 | tcp | incoming | Honeypot: Snare (Tanner) |
|
|
||||||
| 8090 | tcp | incoming | Honeypot: Wordpot |
|
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
### Uninstall T-Pot
|
### 2.2 Uninstall T-Pot
|
||||||
Uninstallation of T-Pot is only available on the [supported Linux distros](#choose-your-distro).<br>
|
If you want to completely remove T-Pot from your system:
|
||||||
To uninstall T-Pot run `~/tpotce/uninstall.sh` and follow the uninstaller instructions, you will have to enter your password at least once.<br>
|
1. Run the command `docker compose down -v` to stop all containers.
|
||||||
Once the uninstall is finished reboot the machine `sudo reboot`
|
2. Remove the T-Pot directory with `rm -rf ~/tpotce`.
|
||||||
<br><br>
|
3. Optionally, uninstall Docker Desktop from your system.
|
||||||
|
|
||||||
|
---
|
||||||
|
|
||||||
|
## 3. Data Analysis and Insights
|
||||||
|
By leveraging T-Pot's data collection features, you can analyze malicious traffic captured by the honeypots. Utilize the Elastic Stack to create detailed visualizations of the attack data and gain actionable insights into emerging threats.
|
||||||
|
|
||||||
## Conclusion
|
---
|
||||||
T-Pot is a powerful and versatile platform for cybersecurity professionals and researchers. Its ability to integrate multiple honeypots, provide advanced visualization tools, and scale across different environments makes it an essential tool for understanding and mitigating cyber threats. By contributing to collective threat intelligence, T-Pot helps build a safer digital world. 🌐🔒
|
|
||||||
|
## 4. Conclusion
|
||||||
|
T-Pot provides an efficient and flexible honeypot solution with a wide array of supported honeypots and analysis tools. It’s an excellent choice for cybersecurity professionals looking to study threat behaviors and improve their defense strategies.
|
||||||
|
|
Loading…
Reference in a new issue