|gbafana25 734e75838e added connection timeout, and edited the welcome banner||7 months ago|
|.github/ISSUE_TEMPLATE||8 months ago|
|images||8 months ago|
|CODE_OF_CONDUCT.md||8 months ago|
|LICENSE||8 months ago|
|README.md||7 months ago|
|boot.py||8 months ago|
|esp8266_honeypot.py||7 months ago|
|install.bat||8 months ago|
|install.sh||7 months ago|
|sys_messages.py||7 months ago|
:stuck_out_tongue_winking_eye: :stuck_out_tongue_winking_eye: :stuck_out_tongue_winking_eye:
Version 1.0 out now!!
If you scan or try to find the location of the IP addresses logged, I am not responsible if you get caught, since port scanning and vulnerability scanning WITHOUT PERMISSION is illegal. Once again, thank you for all your suggestions, edits, and support on social media!! :grinning:
This is a honeypot programmed in Micropython for the ESP8266
The honeypot is set up to act as a telnet server owned by a fake bank. Port forwarding is needed to be configured in order for the microcontroller to be accessed from a public IP. The public IP will be your routers IP, port 23 (12.345.678.910:23). Make sure your router is secured since scanning the IP address of your router will also reveal your router’s login console and/or other open ports. Do this at your own risk!! I am not liable if you get hacked. Comments on the code are still in progress
Original inspiration for this came from the arduino-powered honeypot, found here.
The esp8266 handles all of the socket functions and the terminal prompt. The access point is disabled in the custom
boot.py file. The
boot.py file must have the WiFi SSID, Wifi password, static IP, subnet mask, router IP, and DNS server address changed as needed. The ampy config file (whichever one applies to your system) must be edited to point ampy to the right port (COMx for Windows, /dev/ttyUSB* for Linux, /dev/tty.* for Mac)
A honeypot is a device designed to lure/attract hackers into exploring your device as if it was a legitamte piece of infrastructure or private property that is unprotected. Many open source honeypots, such as the ones found here are designed to report attacks and gather information about hackers’ activity on your network
The ESP8266 in all of its glory: :ok_hand: This honeypot started as a funny thing to do and see how many people still attack Telnet devices. This honeypot can not be as advanced as the ones linked above, since it is being run on a microcontroller. This is why it emulates Telnet. Telnet is a simple protocol that is easy to emulate on microcontroller, due to their being no encryption to worry about.
New!! installer scripts automate copying of files
git clone https://github.com/gbafana25/esp8266_honeypot
install.batif you are on Windows or
install.shif you are on a Unix system
You can verify that the ESP8266 is working by finding it on your network, log into it over telnet, and go to your unique link to see if it logged your IP.
please star this repo if you found it useful and/or interesting