MyGit

cowrie/cowrie

Fork: 887 Star: 5181 (更新于 2024-11-04 03:50:09)

license: NOASSERTION

Language: Python .

Cowrie SSH/Telnet Honeypot https://cowrie.readthedocs.io

最后发布版本: v2.5.0 ( 2023-01-09 23:19:22)

官方网址 GitHub网址

Cowrie

Welcome to the Cowrie GitHub repository


This is the official repository for the Cowrie SSH and Telnet Honeypot effort.

What is Cowrie


Cowrie is a medium to high interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker. In medium interaction mode (shell) it emulates a UNIX system in Python, in high interaction mode (proxy) it functions as an SSH and telnet proxy to observe attacker behavior to another system.

Cowrie <http://github.com/cowrie/cowrie/>_ is maintained by Michel Oosterhof.

Documentation


The Documentation can be found here <https://cowrie.readthedocs.io/en/latest/index.html>_.

Slack


You can join the Cowrie community at the following Slack workspace <https://www.cowrie.org/slack/>_.

Features


  • Choose to run as an emulated shell (default):

    • Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included
    • Possibility of adding fake file contents so the attacker can cat files such as /etc/passwd. Only minimal file contents are included
    • Cowrie saves files downloaded with wget/curl or uploaded with SFTP and scp for later inspection
  • Or proxy SSH and telnet to another system

    • Run as a pure telnet and ssh proxy with monitoring
    • Or let Cowrie manage a pool of QEMU emulated servers to provide the systems to login to

For both settings:

  • Session logs are stored in an UML Compatible <http://user-mode-linux.sourceforge.net/>_ format for easy replay with the bin/playlog utility.
  • SFTP and SCP support for file upload
  • Support for SSH exec commands
  • Logging of direct-tcp connection attempts (ssh proxying)
  • Forward SMTP connections to SMTP Honeypot (e.g. mailoney <https://github.com/awhitehatter/mailoney>_)
  • JSON logging for easy processing in log management solutions

Docker


Docker versions are available.

Configuring Cowrie in Docker


Cowrie in Docker can be configured using environment variables. The
variables start with COWRIE_ then have the section name in capitals,
followed by the stanza in capitals. An example is below to enable
telnet support::

    COWRIE_TELNET_ENABLED=yes

Alternatively, Cowrie in Docker can use an `etc` volume to store
configuration data.  Create `cowrie.cfg` inside the etc volume
with the following contents to enable telnet in your Cowrie Honeypot
in Docker::

    [telnet]
    enabled = yes

Requirements
*****************************************

Software required to run locally:

* Python 3.9+
* python-virtualenv

For Python dependencies, see `requirements.txt <https://github.com/cowrie/cowrie/blob/master/requirements.txt>`_.

Files of interest:
*****************************************

* `etc/cowrie.cfg` - Cowrie's configuration file. Default values can be found in `etc/cowrie.cfg.dist <https://github.com/cowrie/cowrie/blob/master/etc/cowrie.cfg.dist>`_.
* `share/cowrie/fs.pickle` - fake filesystem
* `etc/userdb.txt` - credentials to access the honeypot
* `honeyfs/ <https://github.com/cowrie/cowrie/tree/master/honeyfs>`_ - file contents for the fake filesystem - feel free to copy a real system here or use `bin/fsctl`
* `honeyfs/etc/issue.net` - pre-login banner
* `honeyfs/etc/motd <https://github.com/cowrie/cowrie/blob/master/honeyfs/etc/issue>`_ - post-login banner
* `var/log/cowrie/cowrie.json` - transaction output in JSON format
* `var/log/cowrie/cowrie.log` - log/debug output
* `var/lib/cowrie/tty/` - session logs, replayable with the `bin/playlog` utility.
* `var/lib/cowrie/downloads/` - files transferred from the attacker to the honeypot are stored here
* `share/cowrie/txtcmds/ <https://github.com/cowrie/cowrie/tree/master/share/cowrie/txtcmds>`_ - file contents for simple fake commands
* `bin/createfs <https://github.com/cowrie/cowrie/blob/master/bin/createfs>`_ - used to create the fake filesystem
* `bin/playlog <https://github.com/cowrie/cowrie/blob/master/bin/playlog>`_ - utility to replay session logs

Contributors
***************

Many people have contributed to Cowrie over the years. Special thanks to:

* Upi Tamminen (desaster) for all his work developing Kippo on which Cowrie was based
* Dave Germiquet (davegermiquet) for TFTP support, unit tests, new process handling
* Olivier Bilodeau (obilodeau) for Telnet support
* Ivan Korolev (fe7ch) for many improvements over the years.
* Florian Pelgrim (craneworks) for his work on code cleanup and Docker.
* Guilherme Borges (sgtpepperpt) for SSH and telnet proxy (GSoC 2019)
* And many many others.

最近版本更新:(数据更新于 2024-09-15 00:55:06)

2023-01-09 23:19:22 v2.5.0

2022-07-16 10:41:17 v2.4.0

2021-10-17 23:32:51 v2.3.0

2020-11-12 00:35:30 v2.2.0

2020-05-10 23:39:11 v2.1.0

2019-11-06 02:41:11 v2.0.2

2019-11-02 21:15:35 v2.0.1

2019-10-15 23:50:09 v2.0.0

2019-10-05 00:37:07 v1.9.7

2019-04-05 04:55:53 1.6.0

主题(topics):

attacker, cowrie, cowrie-ssh, deception, decoy, honeypot, kippo, scp, security, sftp, ssh, telnet, telnet-honeypot, threat-analysis, threat-sharing, threatintel

cowrie/cowrie同语言 Python最近更新仓库

2024-11-22 08:12:43 jxxghp/MoviePilot

2024-11-22 02:39:01 goauthentik/authentik

2024-11-22 00:15:39 jumpserver/jumpserver

2024-11-22 00:03:47 comfyanonymous/ComfyUI

2024-11-21 22:06:18 rashevskyv/dbi

2024-11-21 21:09:02 xtekky/gpt4free