Skip to content

KPots is a simple honeypots system to capture and log traffic to specified ports. Requires Netcat for monitoring and IPTables for banning. Requires dig for filtering out your own ip address. (Note: I will be adding alternatives in a later realease, but for now, just install dig.)

License

Notifications You must be signed in to change notification settings

kaotickj/K-Pots

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

47 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Actively Maintained Version-0.1 License MIT Language BASH

Logo

K Pots

🕵🔎 By KaotickJ 👽

KPots is a simple honeypots system to capture and log traffic to specified ports. Requires Netcat for monitoring and IPTables for banning. Requires dig for filtering out your own ip address. (Note: I will be adding alternatives in a later realease, but for now, just install dig.)

Syntax: kpots.sh [-h|-d|-b|-m|-l|-s|-v|-x] <PORT>

options:

  • -h Show this help message
  • -b Generates a new banner for port specified .
  • -l Read the logs
  • -m Only monitor specified port. No logs
  • -p Parse and sort ip addresses from logs
  • -s To monitor specified port in simple mode
  • -v To monitor specified port in verbose mode
  • -x To ban offending IPs

Usage

PLEASE NOTE: K-Pots MUST be run with elevated privileges. Run as root or sudo ./kpots.sh All filepaths used in code examples are relative to the location of kpots.sh.

First, you'll need a banner for the port. K-pots displays the banner text at $DIR/$PORT.txt on connect. To generate a new banner for a port, for example, ssh on port 22 simply run:

sudo ./kpots.sh -b 22

You will have options to use the default banner template:

  • Port $PORT
  • Powered by KPots
  • 🕵🔎 Courtesy of KaotickJ 👽

Or to create a custom one. For more authenticity to the *attacker, it is best to use a custom banner specifically mimmicking any services tied to the given port.

Manual Banner Creation

If you don't want to use the generator, create port#.txt and save your own banner text into it:

touch port#.txt
nano port#.txt

A realistic ssh banner:

The authenticity of host '10.0.2.41 (10.0.2.41)' can't be established. ED25519 key fingerprint is SHA256:1r8zd7E92Jq4/fDkEXzkFJ5RlQ25g1dPA5edubA1L/U. This key is not known by any other names Are you sure you want to continue connecting (yes/no/[fingerprint])?

Monitor Modes

Kpots has 3 monitoring modes, Logging Only, Auto Blocking, and Monitor Only

Logging Only Mode

Logging Only Mode listens for connections and logs output to a file. It does not display connections in the terminal, and is useful for monitoring ports in the background. Logs are stored in ./pots/s-mode.log and are base64 encoded to reduce filesize.

To monitor ssh port 22 for incoming connections and log traffic to ./pots/s-mode.log:

sudo ./kpots.sh -s 22

To view Simple Mode logs:

Method 1
cat <./pots/s-mode.log | bae64 -d
Method 2
sudo ./kpots.sh -l

Choose option 1 - "View Log"

Auto Blocking Mode

Auto Blocking Mode listens for connections displays them in the terminal, and logs output to a file. All traffic is automatically banned via iptables. This is useful for simply blocking malicious scanners automatically. Logs are stored in ./logs/and are base64 encoded to reduce filesize.

To monitor port 22 for incoming connections, display them in the terminal, block all offenders, and log traffic to ./logs:

sudo ./kpots.sh -v 22

To view Auto Blocking Mode logs:

Connection Logs
cat <./logs/activity.log | bae64 -d
Blocked IPs Logs
cat ./logs/blocked-ips.log

Monitor Only Mode

Monitor Only Mode listens for connections and displays them in the terminal. It does not output any logs. It's purpose is for real-time monitoring only.

To monitor port 22 for incoming connections and display them in the terminal, but create no logs:

sudo ./kpots.sh -v 22

Ban Offending IPs

Note that this section is still a work in progress. Auto Blocking mode filters out your ip address automatically, and the Logging Only Mode will soon do the same, as well as also becoming a single cli command process. Please be patient, or feel free to make the modifications yourself (Hint: if [ ! $i = $MYIP ])

Banning IPs that have been captured to kpots logs from logging only mode is a two step process. It's designed this way so that you have an opportunity to check the logs before banning to assure that your own IP(s) are not getting banned. To ban offending IPs:

Steps:
  1. Run the log parser to extract the IP addresses from the logs:
sudo ./kpots.sh -p
  1. Run the IP Blocker
sudo ./kpots.sh -x

Choose to Examine the file to be sure that all IPs listed should be banned (type "y"). The ip log will load in your text editor. It can be an absolute pain in the you know what if you ban your own ip address, so make sure you delete EVERY occurence of yor ip. Because the file was created with kpots running as root, if you edit the ip log file manually, you'll need to edit it as root. Delete any IP addresses that belong to your devices or to your subnet. If you are unsure what this means, don't use this feature until you have learned how to determine what addresses are your own. Once you have closely inspected the IP log and are absolutely certain that you want to block everything listed, save and exit, and you will be returned to the ip blocker. This time, your all set to choose not to edit the file. (type "n").

If there are no errors, the offending IP addresses were successfully banned.

🕵🔎 Courtesy of KaotickJ 👽

Hack The Box

About

KPots is a simple honeypots system to capture and log traffic to specified ports. Requires Netcat for monitoring and IPTables for banning. Requires dig for filtering out your own ip address. (Note: I will be adding alternatives in a later realease, but for now, just install dig.)

Topics

Resources

License

Stars

Watchers

Forks

Packages

No packages published