Skip to content

Latest commit

 

History

History
27 lines (21 loc) · 1.73 KB

Exploitation_of_vulnerability.md

File metadata and controls

27 lines (21 loc) · 1.73 KB

Exploitation of Vulnerability

MITRE ATT&CK technique T1068

Tactic: Credential Access, Defense Evasion, Lateral Movement, Privilege Escalation

Platform: Windows, Linux, Mac

Deception Techniques

  • Set up fake resources using low-interation or high-interaction honeypots
    • Emulated or real operating systems, network protocols/services, or vulnerabilities

Useful Tools

  • Dionaea - A low-interaction honeypot to trap malware exploiting vulnerabilities exposed by services offerd to a network. Dionaea emulates several protocols such as smb, sip, ftp, tftp, mssql, mysql, http, and uses libemu to detect shellcodes.
  • Glutton - All eating honeypot
  • Amun - A low-interaction honeypot, following the concepts of Nepenthes but extending it with more sophisticated emulation and easier maintenance.
  • Conpot - ICS/SCADA honeypot
  • Snare & Tanner - Successors to Glastopf web application honeypot.
    • SNARE - Super Next generation Advanced Reactive honEypot
    • Tanner - Evaluating SNARE events
  • Sysdig
  • MazeRunner community edition
  • More: awesome-honeypots

Useful Resources: