This is a non-IMPACT record, meaning that access to the data is not controlled by IMPACT. For access, see the directions below.

Disclaimer:
This Resource is offered and provided outside of the IMPACT mediation framework. IMPACT and the IMPACT Coordination Council/Blackfire Technology, Inc. expressly disclaim all conditions, representations and warranties including but not limited to Resource availability, quality, accuracy, non-infringement, and non-interference. All Resource information and access is controlled by entities and under terms that are external to the IMPACT legal framework.

Summary

DS-1327
Telnet IoT Honeypot
External Tool
External Data Source
GitHub
Unknown
Unknown
56 (lowest rank is 56)

Category & Restrictions

Other
cyber attack, malware, cyber defense, honeypots, iot, network data, botnet
Unrestricted
true

Description


Python telnet honeypot for catching botnet binaries

This project implements a python telnet server trying to act as a honeypot for IoT Malware which spreads over horribly insecure default passwords on telnet servers on the internet.The honeypot works by emulating a shell environment, just like cowrie. The aim of this project is primarily to automatically analyse Botnet connections and "map" Botnets by linking different connections and even Networks together.

The application has a client/server architecture, with a client (the actual honeypot) accepting telnet connections and a server which receives information about connections and does the analysis.

The backend server exposes a HTTP interface which is used to access to frontend as well as by the clients to push new Connection information to the backend.

Additional Details

2.3MB
false
Unknown
honeypot, telnet, iot, 1327, telnet iot honeypot, inferlink corporation, external, inferlink, external data source, source, corporation, botnet, python, binaries, catching, server, connections, client, project, backend, exposes, servers, default, interface, frontend, architecture, cowrie, spreads, malware, map, environment, application, networks, automatically, aim, horribly, actual, accepting, botnets, connection, insecure, passwords, analyse, linking, analysis, clients, access, other, implements, receives, http, shell, push, emulating