Decoys for internal networks

9 February 2024 1 minute Author: Cyber Witcher

Learn about unique decoy techniques used in cybersecurity to detect and prevent unauthorized access to internal networks. This article presents a list of tools and techniques that allow you to effectively simulate system resources or data that are attractive to potential threats, thereby detecting and preventing attacks on corporate networks.

Tools

Conpot

Simulation of ICS/SCADA systems.

CLICK HERE

Goblin

Phishing tool for blutimming.

CLICK HERE

hontel

Honeypot for Telnet.

CLICK HERE

Kippo

Kippo is an SSH decoy that simulates UNIX systems.

CLICK HERE

Glastopf

A decoy that mimics web application vulnerabilities.

CLICK HERE

Cowrie

Cowrie – Honeypot that simulates SSH and Telnet servers.

CLICK HERE

esp-canary

Network scan detection sensor based on ESP-8266 or ESP-32.

CLICK HERE

log4j-honeypot-flask

log4j-honeypot-flask -bait to detect log4j vulnerability scans.

CLICK HERE

Modern Honey Network

A tool for managing and deploying a honeypot network.

CLICK HERE

Amun

A tool for creating decoys that can simulate different types of services.

CLICK HERE

T-Pot

A platform that combines several honeypots into one system.

CLICK HERE

Dionaea

Honeypot designed to detect attacks on protocols such as SMB, SIP, HTTP and others.

CLICK HERE

Other related articles
Found an error?
If you find an error, take a screenshot and send it to the bot.