mirror of
https://github.com/aljazceru/cowrie.git
synced 2026-02-06 23:14:26 +01:00
731ec40492ade9edc101fb7c4e2acca5743b528e
The old method of checking the honeyfs directory whenever a file was accessed for the first time required that the original path to the file be known. If the file was renamed, copied, moved to a new directory, or one of its parent directories was renamed before its first access, its original path would be completely lost and the real filename would not be resolved. This new method ensures that all A_REALFILE attributes are populated upfront, and the filesystem can be rearranged plenty without breaking honeyfs.
Cowrie
Cowrie is a medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker.
Cowrie is developed by Michel Oosterhof.
Features
Some interesting features:
- Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included
- Possibility of adding fake file contents so the attacker can
catfiles such as/etc/passwd. Only minimal file contents are included - Session logs stored in an UML Compatible format for easy replay with original timings
- Cowrie saves files downloaded with wget/curl or uploaded with SFTP and scp for later inspection
Additional functionality over standard kippo:
- SFTP and SCP support for file upload
- Support for SSH exec commands
- Logging of direct-tcp connection attempts (ssh proxying)
- Forward SMTP connections to SMTP Honeypot (e.g. mailoney)
- Logging in JSON format for easy processing in log management solutions
- Many, many additional commands
Requirements
Software required:
- Python 2.7+, (Python 3 not yet supported due to Twisted dependencies)
- Zope Interface 3.6.0+
- Twisted 12.0+
- python-crypto
- python-cryptography
- python-pyasn1
- python-gmpy2 (recommended)
- python-mysqldb (for MySQL output)
- python-OpenSSL
Files of interest:
cowrie.cfg- Cowrie's configuration file. Default values can be found incowrie.cfg.distdata/fs.pickle- fake filesystemdata/userdb.txt- credentials allowed or disallowed to access the honeypotdl/- files transferred from the attacker to the honeypot are stored herehoneyfs/- file contents for the fake filesystem - feel free to copy a real system here or usebin/fsctllog/cowrie.json- transaction output in JSON formatlog/cowrie.log- log/debug outputlog/tty/*.log- session logstxtcmds/- file contents for the fake commandsbin/createfs- used to create the fake filesystembin/playlog- utility to replay session logs
Is it secure?
Maybe. See FAQ
I have some questions!
Please visit https://github.com/micheloosterhof/cowrie/issues
Contributors
Many people have contributed to Cowrie over the years. Special thanks to:
- Upi Tamminen (desaster) for all his work developing Kippo on which Cowrie was based
Description
Languages
Python
99.3%
Shell
0.7%