NOTE: This is just my Docker version as a Docker version from CZ.NIC was discontinued (but can be still installed via pip, deb, rpm).
Honeypot is a special software which simulates an operating system and allows an attacker to log in via SSH or telnet and execute commands or download malware. Commands are recorded and used to analyze the behavior. Malware can be analyzed as well.
Volunteers interested in joining the research will register on this site and add the first device to get an identification token.
You install and run the HaaS proxy application, downloadable from our website, which forwards incoming traffic from port 22 (commonly used for SSH) to the HaaS server, where Cowrie honeypot simulates a device and records executed commands.
More information at https://haas.nic.cz.
- Version: 2.0.2 (2020-07-29)
- You can consider using separate network in Docker, or maybe an own IP address by using macvlan.
- Forward your port
22
from WAN to the port2222
of the Docker machine. - Obtain
DEVICE_TOKEN
for your session and put it instead<YOUR_TOKEN>
. LOG_LEVEL
parameter is optional. If not setLOG_LEVEL=info
is used.- Run Docker container
version: "3"
services:
haas:
container_name: haas
image: mikromcz/haas
restart: unless-stopped
environment:
- DEVICE_TOKEN=<YOUR_TOKEN>
- LOG_LEVEL=<error,warning,debug,info>
ports:
- 2222:2222
docker run -d \
--name haas \
--restart=unless-stopped \
-e "DEVICE_TOKEN=<YOUR_TOKEN>" \
-e "LOG_LEVEL=<error,warning,debug,info>" \
-p 2222:2222 \
mikromcz/haas