This unfortunately named program listens for incoming ssh connections and logs the IP address, username, and password used by the client. This is a low-interaction honeypot that does not allow malware or attackers to login.
This was originally written to gather rudimentary intelligence on brute force attacks and not meant for production usage.
Nowadays, I mostly use this at attack/defend CTFs paired with sshunt: https://github.com/droberson/sshunt
I set up sshunt to forward tools such as Hydra, Metasploit, and Ncrack to ssh-honeypot and allow OpenSSH clients to connect to ssh normally.
Make sure headers/development packages are installed for:
- libssh
- openssl
- libjson-c
- libpcap
apt install libssh-dev libjson-c-dev libpcap-dev libssl-dev
Build and Run
make
ssh-keygen -t rsa -f ./ssh-honeypot.rsa
bin/ssh-honeypot -r ./ssh-honeypot.rsa
WARNING: I haven't tested JSON logging, HASSH, or anything really on OSX. MacOS is officially unsupported as I do not own any Macs to test this software with.
Make sure that xcode is up to date.
Install libssh and json-c
brew install libssh json-c
Specify MakefileOSX with make:
make -f MakefileOSX
Please take a look at our Docker documentation.
As of version 0.2.0, ssh-honeypot attempts to calculate the HASSH of the client software initiating sessions with ssh-honeypot. In short, you can tell if the client is using OpenSSH, PuTTY, SecureCRT, ...
For more information about HASSH, refer to these links:
- https://github.com/salesforce/hassh
- https://engineering.salesforce.com/open-sourcing-hassh-abed3ae5044c
As of version 0.0.5, this supports logging to syslog. This feature is toggled with the -s flag. It is up to you to configure your syslog facilities appropriately. This logs to LOG_AUTHPRIV which is typically /var/log/auth.log. You may want to modify this to use one of the LOG_LOCAL facilities if you are worried about password leakage.
As of version 0.0.8, you can drop root privileges of this program after binding to a privileged port. You can now run this as nobody on port 22 for example instead of root, but have to initially start it as root:
sudo bin/ssh-honeypot -p 22 -u nobody
Beware that this chowns the logfile to the user specified as well.
ssh-honeypot allows you to change the server's banner to blend in with other hosts on your network or mimic a specific device.
List available banners
bin/ssh-honeypot -b
Set banner string
bin/ssh-honeypot -b "my banner string"
Set banner by index
bin/ssh-honeypot -i <banner index>
The -j
CLI flag specifies the path to log results in JSON
format. This feature can make log analytics much easier because many
languages have robust JSON support.
JSON logs can be sent to a remote host. The -J
and -P
CLI flags
set the host and port to send logs in JSON to, respectively. At this
time, logs are transmitted using UDP and not encrypted.
This feature can be useful when running multiple ssh-honeypot instances. Listeners can be created for Splunk and ElasticSearch to ingest these logs and make them searchable.
On Linux you can install ssh-honeypot as a Systemd service so that it automatically runs at system startup:
make install
systemctl enable --now ssh-honeypot
Before installing, check ssh-honeypot.service
and modify it to run
with the options you want.