Skip to content

Honeypot that reads log files from the OpenSSH service in Linux and uploads attacking IP's to the Maltiverse IoC Search Engine

Notifications You must be signed in to change notification settings

maltiverse/maltiverse-linux-ssh-honeypot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 

Repository files navigation

maltiverse-linux-ssh-honeypot

Maltiverse Linux SSH honeypot is a script to contribute to the Maltiverse Search Engine maltiverse.com.

Maltiverse is an open IoC search engine to support the cybersecurity community on their research an investigations. (https://whatis.maltiverse.com/)

There is a REST API to handle the service and help automation which is defined here:

https://app.swaggerhub.com/apis-docs/maltiverse/api/1.0.0-oas3

This script looks for attacking IP's into SSH log files in a Linux system and pushes them to the Maltiverse Search Engine.

There are sereval requirements for this script to be accomplished:

  • Server running Linux OS
  • Service SSH running and exposed to the internet
  • Outbound connectivity to the resource https://api.maltiverse.com
  • A Maltiverse user account with Team Researcher privileges. Only team researchers are allowed to upload indicators into Maltiverse. Create an account, then create or join a team, and get Team Researcher permissions!

First of all it is required to install python-maltiverse package:

pip install git+https://github.com/maltiverse/python-maltiverse

Then download the script locally:

cd /opt && git clone https://github.com/maltiverse/maltiverse-linux-ssh-honeypot

Now the script is located in /opt/maltiverse-linux-ssh-honeypot and ready to be executed

To execute this script it is required to provide maltiverse username and password to log in and upload the indicators of compromise found.

A) For Production environments:

Parameters "--email" and "--password" running the command from the console will provide credentials to the script

export MALTIVERSE_EMAIL=your@email.com
export MALTIVERSE_PASSWORD=yoursecret!
python /opt/maltiverse_linux_ssh_honeypot.py

To make it permanent after a reboot you should run the following commands as the user that will run the script (In example root):

echo "export MALTIVERSE_EMAIL=your@email.com" >> ~/.profile
echo "export MALTIVERSE_PASSWORD=yoursecret!" >> ~/.profile

To schedule the script running as a task we can create an entry into the /etc/crontab file and do it hourly. The entry would look like this:

echo "30 * * * * $(whoami) python /opt/maltiverse_linux_ssh_honeypot.py" >> /etc/crontab

B) For Testing environments:

Parameters "--email" and "--password" running the command from the console will provide credentials to the script

python /opt/maltiverse_linux_ssh_honeypot.py --email your@email.com --passwords secret!

We do not recommend scheduling this script passing parameters by standard input using cron as /etc/crontab file is readable by all users in the system and passwords are at risk

About

Honeypot that reads log files from the OpenSSH service in Linux and uploads attacking IP's to the Maltiverse IoC Search Engine

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages