mirror of https://github.com/cowrie/cowrie.git
Tweaked README (Files of interest)
This commit is contained in:
parent
2a4925b65f
commit
6da973d84d
26
README.md
26
README.md
|
@ -5,9 +5,11 @@ Cowrie is a medium interaction SSH honeypot designed to log brute force attacks
|
|||
Cowrie is directly based on [Kippo](http://github.com/desaster/kippo/) by Upi Tamminen (desaster).
|
||||
|
||||
## Features
|
||||
|
||||
Some interesting features:
|
||||
|
||||
* Fake filesystem with the ability to add/remove files. A full fake filesystem resembling a Debian 5.0 installation is included
|
||||
* Possibility of adding fake file contents so the attacker can 'cat' files such as /etc/passwd. Only minimal file contents are included
|
||||
* Possibility of adding fake file contents so the attacker can `cat` files such as `/etc/passwd`. Only minimal file contents are included
|
||||
* Session logs stored in an [UML Compatible](http://user-mode-linux.sourceforge.net/) format for easy replay with original timings
|
||||
* Cowrie saves files downloaded with wget/curl or uploaded with SFTP and scp for later inspection
|
||||
|
||||
|
@ -20,6 +22,7 @@ Additional functionality over standard kippo:
|
|||
* Many, many additional commands
|
||||
|
||||
## Requirements
|
||||
|
||||
Software required:
|
||||
|
||||
* An operating system (tested on Debian, CentOS, FreeBSD and Windows 7)
|
||||
|
@ -31,17 +34,22 @@ Software required:
|
|||
|
||||
## Files of interest:
|
||||
|
||||
* dl/ - files downloaded with wget are stored here
|
||||
* log/cowrie.log - log/debug output
|
||||
* log/cowrie.json - transaction output in JSON format
|
||||
* log/tty/ - session logs
|
||||
* utils/playlog.py - utility to replay session logs
|
||||
* utils/createfs.py - used to create fs.pickle
|
||||
* data/fs.pickle - fake filesystem
|
||||
* honeyfs/ - file contents for the fake filesystem - feel free to copy a real system here
|
||||
* `cowrie.cfg` - Cowrie's configuration file. Default values can be found in `cowrie.cfg.dist`
|
||||
* `data/fs.pickle` - fake filesystem
|
||||
* `data/userdb.txt` - credentials allowed or disallowed to access the honeypot
|
||||
* `dl/` - files transferred from the attacker to the honeypot are stored here
|
||||
* `honeyfs/` - file contents for the fake filesystem - feel free to copy a real system here or use `utils/fsctl.py`
|
||||
* `log/cowrie.json` - transaction output in JSON format
|
||||
* `log/cowrie.log` - log/debug output
|
||||
* `log/tty/*.log` - session logs
|
||||
* `txtcmds/` - file contents for the fake commands
|
||||
* `utils/createfs.py` - used to create the fake filesystem
|
||||
* `utils/playlog.py` - utility to replay session logs
|
||||
|
||||
## Is it secure?
|
||||
|
||||
Maybe. See [FAQ](https://github.com/desaster/kippo/wiki/FAQ)
|
||||
|
||||
## I have some questions!
|
||||
|
||||
Please visit https://github.com/micheloosterhof/cowrie/issues
|
||||
|
|
Loading…
Reference in New Issue