Minecraft Honeypot for Log4j exploit. CVE-2021-44228 Log4Shell LogJam
Go to file
Adam Zambrzycki 6306f47009 Add check 2021-12-13 19:03:53 +01:00
.github/workflows Add check 2021-12-13 19:03:53 +01:00
extractor Use log instead of fmt 2021-12-11 01:27:59 +01:00
minecraft Add support from 1.7.2 to 1.16.5 2021-12-13 12:49:39 +01:00
.dockerignore Dockerize honeypot using multi-stage Dockerfile (#1) 2021-12-13 18:46:59 +01:00
.gitignore Initial commit 2021-12-11 00:42:15 +01:00
Dockerfile Dockerize honeypot using multi-stage Dockerfile (#1) 2021-12-13 18:46:59 +01:00
README.md Dockerize honeypot using multi-stage Dockerfile (#1) 2021-12-13 18:46:59 +01:00
go.mod Initial commit 2021-12-11 00:42:15 +01:00
go.sum Downgrade to 1.16.5 2021-12-11 16:22:14 +01:00
main.go Add cli flag for choosing bind address 2021-12-11 00:47:59 +01:00

README.md

Minecraft Log4j Honeypot

This honeypots runs fake Minecraft server (1.7.2 - 1.16.5 without snapshots) waiting to be exploited. Payload classes are saved to payloads/ directory.

Requirements

  • Golang

Running

Natively

git clone https://github.com/Adikso/minecraft-log4j-honeypot.git
cd minecraft-log4j-honeypot
go build .
./minecraft-log4j-honeypot

Using docker

git clone https://github.com/Adikso/minecraft-log4j-honeypot.git
cd minecraft-log4j-honeypot
docker build -t minecraft-log4j-honeypot .
mkdir payloads
docker run --rm -it --mount type=bind,source="${PWD}/payloads",target=/payloads --user=`id -u` -p 25565:25565 minecraft-log4j-honeypot