OWA Honeypot

OWA Honeypot

#Threat Defense#Honeypots

A low interaction honeypot for detecting CVE-2018-0101 vulnerability in Cisco ASA component.

Visit Website

A Basic Flask-Based Outlook Web App (OWA) Honeypot for Cybersecurity Experimentation

This is a basic Flask-based Outlook Web App (OWA) honeypot created for cybersecurity enthusiasts. It allows users to experiment with various threat scenarios that are specific to OWA.

The Tool Simulates an OWA Environment for Malicious Activity Analysis

The tool simulates an OWA (Outlook Web App) environment to identify and analyze potential malicious activities. This simulation provides valuable insights that can aid in developing effective defense strategies. To install the tool, clone the GitHub repository, set up a Python3 virtual environment, install the necessary dependencies, and then execute the 'owa_pot.py' script. Please note: Running the honeypot on port 80 is not advisable for deployments that are exposed to the internet.

For Additional Information, Please Refer To

For additional information, please refer to the detailed write-up available at https://joda32.github.io/2019/06/11/owa-plus-pastebin.html.