forked from trustedsec/artillery
-
Notifications
You must be signed in to change notification settings - Fork 0
gchetrick/artillery
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ The Artillery Project Written by: Dave Kennedy (ReL1K) Website: http://www.trustedsec.com Email: davek [at] trustedsec.com Twitter: dave_rel1k ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run ./install.py and hit yes, this will install Artillery in /var/artillery and edit your /etc/init.d/rc.local to start artillery on boot up. Artillery does a combination of things: 1. It sets up multiple common ports that are attacked. If someone connects to these ports, it blacklists them forever. - To remove blacklisted ip's, remove them from /var/artillery/banlist.txt 2. It monitors what folders you specify, by default it checks /var/www and /etc for modifications. 3. It monitors the SSH logs and looks for brute force attempts. 4. It will email you when attacks occur and let you know what the attack was. Be sure to edit the /var/artillery/config to turn on mail delivery, brute force attempt customizations, and what folders to monitor. Email me at davek [at] social-engineer.org for bug reports or enhancements. For those technical folks you can find all of the code in the following structure: src/core.py - main central code reuse for things shared between each module src/monitor.py - main monitoring module for changes to the filesystem src/ssh_monitor.py - main monitoring module for SSH brute forcing src/honeypot.py - main module for honeypot detection src/harden.py - check for basic hardening to the OS database/integrity.data - main database for maintaining sha512 hashes of filesystem setup.py - copies files to /var/artillery/ then edits /etc/init.d/rc.local to ensure artillery starts per each reboot TESTED ON: Linux Windows
About
The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.
Resources
Stars
Watchers
Forks
Releases
No releases published
Packages 0
No packages published
Languages
- Python 100.0%