
pghoney
#Threat Defense#Honeypots
Honey-Pod for SSH that logs username and password tries during brute-force attacks.
A Simple Postgres Honey Pot Inspired by Elastichoney
This is a straightforward implementation of a Postgres honey pot, drawing inspiration from Elastichoney.
Getting Started:
- To install the necessary dependencies, run: go get ./...
- To start pghoney (default address is 127.0.0.1:5432), execute: go run *.go
- To view the command-line interface help output, use: go run *.go -h
Initial Release TODO:
- Develop a deployment script within fflemming's fork of mhn
- Implement SSL support
- Create integration tests using nmap and psql
- Develop integration tests using github.com/lib/pq
- Ensure proper error handling for 'cancelling' a query (12345678, which is very similar to an SSL request)
- Avoid hardcoding the md5 salt
- Implement a mechanism for storing passwords in a separate database.