Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam
Go to file
Adam Zambrzycki 88918dc1c5
Create LICENSE
2021-12-14 14:43:35 +01:00
.github/workflows Docker hub workflow (#2) 2021-12-13 19:04:54 +01:00
extractor Fix missing attributes on deserialization approach 2021-12-13 23:04:01 +01:00
minecraft Add support from 1.7.2 to 1.16.5 2021-12-13 12:49:39 +01:00
.dockerignore Dockerize honeypot using multi-stage Dockerfile (#1) 2021-12-13 18:46:59 +01:00
.gitignore Initial commit 2021-12-11 00:42:15 +01:00
Dockerfile Dockerize honeypot using multi-stage Dockerfile (#1) 2021-12-13 18:46:59 +01:00
LICENSE Create LICENSE 2021-12-14 14:43:35 +01:00
README.md Update golang version in readme 2021-12-13 19:54:04 +01:00
go.mod Initial commit 2021-12-11 00:42:15 +01:00
go.sum Downgrade to 1.16.5 2021-12-11 16:22:14 +01:00
main.go Add cli flag for choosing bind address 2021-12-11 00:47:59 +01:00

README.md

Minecraft Log4j Honeypot

This honeypots runs fake Minecraft server (1.7.2 - 1.16.5 without snapshots) waiting to be exploited. Payload classes are saved to payloads/ directory.

Requirements

  • Golang 1.16+

Running

Natively

git clone https://github.com/Adikso/minecraft-log4j-honeypot.git
cd minecraft-log4j-honeypot
go build .
./minecraft-log4j-honeypot

Using docker

mkdir payloads
docker run --rm -it --mount type=bind,source="${PWD}/payloads",target=/payloads --user=`id -u` -p 25565:25565 adikso/minecraft-log4j-honeypot:latest