
SNARE
#Threat Defense#Honeypots
A collection of scripts for debugging SSRF, blind XSS, and XXE vulnerabilities
SNARE: A Web Application Honeypot Sensor
SNARE is a web application honeypot sensor designed to attract various types of malicious activities from the Internet.
You can find the documentation here.
Basic Concepts:
1. Surface first.
2. Focus on generating the attack surface.
3. Sensors and masters.
4. Lightweight collectors (SNARE) and a central decision maker (Tanner).
Getting Started:
To run SNARE, you need Python 3.6.
Testing SNARE on a Recent Ubuntu-Based Linux
Steps to set up:
Get SNARE: git clone https://github.com/mushorg/snare.git
and cd snare
[Optional] Create a virtual environment: python3 -m venv venv
[Optional] Activate the virtual environment: . venv/bin/activate
Note: Do not use sudo with the commands below if you are running SNARE in a virtual environment.
Install requirements: sudo pip3 install -r requirements.txt
Set up SNARE: sudo python3 setup.py install
Clone a page: sudo clone --target http://example.com --path
Run SNARE: sudo snare --port 8080 --page-dir example.com --path
Test: Visit http://localhost:8080/index.html
Optionally, you can have your own tanner service running.
[Note: The cloner clones the entire website; you can restrict it to a desired depth of cloning.