SNARE

SNARE

#Threat Defense#Honeypots

A collection of scripts for debugging SSRF, blind XSS, and XXE vulnerabilities

Visit Website

SNARE: A Web Application Honeypot Sensor

SNARE is a web application honeypot sensor designed to attract various types of malicious activities from the Internet. You can find the documentation here. Basic Concepts: 1. Surface first. 2. Focus on generating the attack surface. 3. Sensors and masters. 4. Lightweight collectors (SNARE) and a central decision maker (Tanner). Getting Started: To run SNARE, you need Python 3.6.

Testing SNARE on a Recent Ubuntu-Based Linux

Steps to set up: Get SNARE: git clone https://github.com/mushorg/snare.git and cd snare [Optional] Create a virtual environment: python3 -m venv venv [Optional] Activate the virtual environment: . venv/bin/activate Note: Do not use sudo with the commands below if you are running SNARE in a virtual environment. Install requirements: sudo pip3 install -r requirements.txt Set up SNARE: sudo python3 setup.py install Clone a page: sudo clone --target http://example.com --path Run SNARE: sudo snare --port 8080 --page-dir example.com --path Test: Visit http://localhost:8080/index.html Optionally, you can have your own tanner service running. [Note: The cloner clones the entire website; you can restrict it to a desired depth of cloning.