Artillery-a combination of honeypot, monitoring tool, and alerting system.
Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run
Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run
./setup.py and hit yes, this will install Artillery in /var/artillery and edit your /etc/init.d/rc.local to start artillery on boot up.Features
- It sets up multiple common ports that are attacked. If someone connects to these ports, it blacklists them forever (to remove blacklisted ip's, remove them from
/var/artillery/banlist.txt) - It monitors what folders you specify, by default it checks
/var/wwwand/etcfor modifications. - It monitors the SSH logs and looks for brute force attempts.
- It will email you when attacks occur and let you know what the attack was.
/var/artillery/config to turn on mail delivery, brute force attempt customizations, and what folders to monitor.Project structure
For those technical folks you can find all of the code in the following structure:src/core.py- main central code reuse for things shared between each modulesrc/monitor.py- main monitoring module for changes to the filesystemsrc/ssh_monitor.py- main monitoring module for SSH brute forcingsrc/honeypot.py- main module for honeypot detectionsrc/harden.py- check for basic hardening to the OSdatabase/integrity.data- main database for maintaining sha512 hashes of filesystemsetup.py- copies files to/var/artillery/then edits/etc/init.d/artilleryto ensure artillery starts per each reboot
Supported platforms
- Linux
- Windows
Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run
./setup.py and hit yes, this will install Artillery in /var/artillery and edit your /etc/init.d/rc.local to start artillery on boot up.Features
- It sets up multiple common ports that are attacked. If someone connects to these ports, it blacklists them forever (to remove blacklisted ip's, remove them from
/var/artillery/banlist.txt) - It monitors what folders you specify, by default it checks
/var/wwwand/etcfor modifications. - It monitors the SSH logs and looks for brute force attempts.
- It will email you when attacks occur and let you know what the attack was.
/var/artillery/config to turn on mail delivery, brute force attempt customizations, and what folders to monitor.Project structure
For those technical folks you can find all of the code in the following structure:src/core.py- main central code reuse for things shared between each modulesrc/monitor.py- main monitoring module for changes to the filesystemsrc/ssh_monitor.py- main monitoring module for SSH brute forcingsrc/honeypot.py- main module for honeypot detectionsrc/harden.py- check for basic hardening to the OSdatabase/integrity.data- main database for maintaining sha512 hashes of filesystemsetup.py- copies files to/var/artillery/then edits/etc/init.d/artilleryto ensure artillery starts per each reboot
Supported platforms
- Linux
- Windows
Post a Comment