Git Product home page Git Product logo

esp8266_honeypot's Introduction

THE ESP8266 HONEYPOT: A PROJECT TO TRAP SCRIPT KIDDIES EVERYWHERE!!

๐Ÿ˜œ ๐Ÿ˜œ ๐Ÿ˜œ

Version 1.0 out now!!

If you scan or try to find the location of the IP addresses logged, I am not responsible if you get caught, since port scanning and vulnerability scanning WITHOUT PERMISSION is illegal. Once again, thank you for all your suggestions, edits, and support on social media!! ๐Ÿ˜€

hackers

About this project

This is a honeypot programmed in Micropython for the ESP8266

The honeypot is set up to act as a telnet server owned by a fake bank. Port forwarding is needed to be configured in order for the microcontroller to be accessed from a public IP. The public IP will be your routers IP, port 23 (12.345.678.910:23). Make sure your router is secured since scanning the IP address of your router will also reveal your router's login console and/or other open ports. Do this at your own risk!! I am not liable if you get hacked. Comments on the code are still in progress

Original inspiration for this came from the arduino-powered honeypot, found here.

The esp8266 handles all of the socket functions and the terminal prompt. The access point is disabled in the custom boot.py file. The boot.py file must have the WiFi SSID, Wifi password, static IP, subnet mask, router IP, and DNS server address changed as needed. The ampy config file (whichever one applies to your system) must be edited to point ampy to the right port (COMx for Windows, /dev/ttyUSB* for Linux, /dev/tty.* for Mac)

What is a honeypot

A honeypot is a device designed to lure/attract hackers into exploring your device as if it was a legitamte piece of infrastructure or private property that is unprotected. Many open source honeypots, such as the ones found here are designed to report attacks and gather information about hackers' activity on your network

The SCRIPT KIDDIE HOLE OF DOOM

The ESP8266 in all of its glory: ๐Ÿ‘Œ The_hole_of_doom This honeypot started as a funny thing to do and see how many people still attack Telnet devices. This honeypot can not be as advanced as the ones linked above, since it is being run on a microcontroller. This is why it emulates Telnet. Telnet is a simple protocol that is easy to emulate on microcontroller, due to their being no encryption to worry about.

The hardware and software

  • An ESP8266 microcontroller (Adafruit Feather version pictured above)
  • A Windows, Linux, or MacOS computer ๐Ÿ’ป
  • If you have the bare ESP8266 module, you will also need a USB to Serial converter board, and the additional drivers to go with it
  • If you have a board with the USB to Serial chip already on it, you still need the appropriate drivers and a micro USB cable ๐Ÿ”Œ

Features ๐Ÿ‘Œ

  • Console interface has all-uppercase text
  • Fake database contents
  • Fake system information
  • Fake FDIC "get off my lawn" warnings

The attack sequence and mentality of the script kiddie

script_kiddie

  1. Your ESP8266 honeypot found either with Shodan, Google Dorks, on accident, etc.
  2. The hacker scans your router, and finds port 23 open. An experienced hacker will know it is a honeypot (routers do not just have port 23 open randomly!!)
  3. The script kiddie will keep trying to guess the password for the router ๐Ÿ˜•, until they decide to try the telnet port, and they get excited that no password is required to login to the server!! ๐Ÿ˜€
  4. They start entering commands, but after awhile, something doesn't seem right.... UNTIL THEY TRY TO EXIT AND REALIZE THAT THEY WERE BEING WATCHED THE WHOLE TIME!!! MWHAHAHAHA ๐Ÿ˜ˆ ๐Ÿ˜ˆ ๐Ÿ˜ฒ (not really, but their IP was logged)

Deploying the script

New!! installer scripts automate copying of files

  • clone this repository with git clone https://github.com/gbafana25/esp8266_honeypot
  • switch to the project directory with cd esp8266_honeypot/
  • Run install.bat if you are on Windows or install.sh if you are on a Unix system
  • Reset the microcontroller
  • Wait for those l33t h4x0rs ๐Ÿ‘Œ

You can verify that the ESP8266 is working by finding it on your network, log into it over telnet, and go to your unique link to see if it logged your IP.

Monitoring (optional)

Wireshark

  • set up Wireshark on a free computer to run all the time and capture packets
  • set a filter for Telnet ports
  • you will be able to see the plain ASCII text, since Telnet is not encrypted!!

Coming soon:

  • more comments on code (probably will always be here)
  • more commands available to hackers (suggestions welcome on ycombinator and reddit)
  • better readme (screenshots of nmap, dweet messages, etc., and memes possibly)

please star this repo if you found it useful and/or interesting

esp8266_honeypot's People

Contributors

cristoper avatar drawkula avatar gbafana25 avatar

Watchers

 avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.