HONEYTRAP

Section: Maintenance Commands (8)
Updated: 17 June 2006
Index

NAME

honeytrap – trap attacks against tcp services

SYNOPSIS

honeytrap [ -Dpmv ] [ -i interface ] [ -a ip address ]
                [ -l listen timeout ] [ -r read timeout ]
                [ -t loglevel ] [ -L logfile ] [ -P pidfile ]
                [ -C configfile ] [ expression ]

DESCRIPTION

honeytrap is a network security tool written to observe attacks against TCP services. As a low-interactive honeypot, it collects information regarding known or unknown network-based attacks. It starts server processes dynamically at the time of incoming connection requests. This generic behavior makes it possible to respond to most network-based attacks. Observed data can be processed with plugins for automatic analysis.

All data submitted to honeytrap can be dumped to the filesystem for further investigation. Attacks can be parsed automatically for download commands. Plugins enable honeytrap to recognize FTP and TFTP commands and do an automated download of online ressources.

honeytrap must be run by root or installed setuid to root, in order to bind to privileged ports. Always use the -u and -g flags to drop privileges early and switch to an unprivileged user and group as soon as possible.

OPTIONS

-a
ip address. Watch for rejected connections to ip address. This is normally not needed as honeytrap tries to get the corresponding address for interface automatically.
-g
group. Change the group/GID of dynamic server processes to group after initialization.
-h
Print usage information to standard output, then exit gracefully.
-i
interface. Watch for rejected connections on interface.
-l
listen timeout. Terminate dynamic servers after the specified number of seconds. Default is 30.
-m
Run in mirror mode. Mirror incoming connections back to remote hosts.
-p
Put interface into promiscuous mode.
-r
read timeout. Terminate connection handlers after the specified number of seconds. Default is 1.
-t
log level. Log verbosity (0-6). Default is 3, 0 is off.
-u
user. Run as user after initialization.
-v
Print version number to standard output, then exit gracefully.
-C
configuration file. Read configuration from configuration file.
-D
Don't daemonize.
-L
log file. Log messages to log file.
-P
pid file. Write process ID of master process to pid file.

expression
To recognize rejected connections, honeytrap uses a berkeley packet filter (bpf) to sniff TCP reset packets sent to a remote host. The filter can be restricted by adding a bpf expression.

EXAMPLE

Read configuration from /etc/honeytrap.conf, run on eth0 as nobody/nogroup and log to /var/log/honeytrap.log. Set the log level to LOG_NOISY ( 5 ) and stay in foreground ( -D ):

	honeytrap -C /etc/honeytrap.conf -i eth0 -u nobody -g nogroup -L /var/log/honeytrap.log -t 5 -D

NOTES

As a honeypot, honeytrap is exposed to attacks that might compromise the software itself. Running it into a hardened and secured environment is a good idea. Linking against a stack protection library might also improve security. The configure script supports the electric fence malloc debugger. Use it.

SEE ALSO

bpf(4), pcap(3), tcp(7).

AUTHOR

This version of honeytrap was written by Tillmann Werner.

BUGS

Please report any bugs to honeytrap-at-users.sourceforge.net.


Index

NAME
SYNOPSIS
DESCRIPTION
OPTIONS
EXAMPLE
NOTES
SEE ALSO
AUTHOR
BUGS


honeytrap was written by Tillmann Werner.

Powered by Sourceforge. Valid XHTML 1.0
SourceForge.net Logo Valid XHTML 1.0 Strict