a single purpose honeypot to bait threat actors exploiting callstranger
emulated device: LG Smart TV (by default)
- (optional) rate limit the inbound UDP traffic with iptables:
- view and optionally edit port numbers for UPNP honeypot
- run
bash rate_limit.sh
- configure the honeypot in
config.ini
(rename or copy the default config from config example) - inspect and rename the description XML file to
description.xml
- inspect and edit the
eventSubURL
elements in the XML if necessary- [if changed] don't forget the change the UPNP port in the configuration file
- create python virtual environment
pip install .
- UDP/1900 socket listener
- replies to
M-SEARCH
requests with arbitraryST
header - to evade possible SSDP DoS amplification on the running SSDP it rate limits the inbound requests per threat actor IP address
- by defulat allows 1/sec, 5/min, 10/hour
- rate limiting is optional, but ENABLED by default
USAGE: hon_ssdp
- TCP/1784 socket listener
- accepts connections
- receives SUBSCRIBE requests
- optionally responses with standard HTTP 200 OK or doesn't (configurable)
USAGE: hon_upnp
- TCP/1784 sniffer
- logs the inbound/outbound traffic
USAGE: upnp_sniff
- helper file to craft NOTIFY request body