Walter.Net.HoneyPot
2023.10.12.1926
Prefix Reserved
See the version list below for details.
dotnet add package Walter.Net.HoneyPot --version 2023.10.12.1926
NuGet\Install-Package Walter.Net.HoneyPot -Version 2023.10.12.1926
<PackageReference Include="Walter.Net.HoneyPot" Version="2023.10.12.1926" />
paket add Walter.Net.HoneyPot --version 2023.10.12.1926
#r "nuget: Walter.Net.HoneyPot, 2023.10.12.1926"
// Install Walter.Net.HoneyPot as a Cake Addin #addin nuget:?package=Walter.Net.HoneyPot&version=2023.10.12.1926 // Install Walter.Net.HoneyPot as a Cake Tool #tool nuget:?package=Walter.Net.HoneyPot&version=2023.10.12.1926
About the Honey-Pot detector
The honey pot detector allows to detect and interact with applications that are attempting to communicate with your server via a particular port. Understanding who is maliciously trying to exploit the system helps identify bad actors and will allow you to tune the system alerting an attempt by a system classified as being a bad actor and will allow the framework to block any requests and or return a payload.
Integrating the honey-pot detector in your application
Integrating the honey-pot listener takes 3 steps.
step 1:
Foreword ports in your edge switch to ports monitored by the honey-pot configuration. A recommendation is to map the ports to a free port not used by the server. An example map port 22 to port 60022 and configure the honey-port to watch any communication on port 4000
step 2
Configure the firewall to allow communication on port 4000.
step 3
Configure the application to subscribe to the port detections. To do this in the firewall you should use a configuration similar to this:
services.AddFireWall()
.UsePortScannerProtection(connectionString: DatabaseConnections.FireWallState, options =>
{
/* map the service ports to a local port on your computer
* Redirect the requests to your computer and open the firewall
* for the redirected ports */
options.SSH = 4000; // map port 22 to port 4000 on your router
options.TSQL = 4001; // map port 1433 to port 4001 on your router
options.Telnet = 4002; // map port 23 to port 4002 on your router
options.MYSQL = 4005; // map port 3306 to port 4005 on your router
options.DNS = 4006; // map port 53 to port 4005 on your router
options.Telnet 4007; //map port 23 to port 4007 on your router;
/*you can manually map port aliases in the range from 0 till 65535*/
options.AddOrUpdate(externalPort: 587, internalPort: 4007, name: "ESMTP Extended Simple Mail Transfer Protocol");
options.AddOrUpdate(externalPort: 647, internalPort: 4008, name: "DHCP Fail-over");
/*Record up-to 8,000 character when someone is trying to attack the service for legal reporting*/
options.MaximumDataSizeToAccept = 254;
/*Look between every 100ms and 30000ms if someone is trying to gain access to the system */
options.PoolFrequency = 100;
/* Add a default reply to any connection, you can send an auto-reply
* You can use the template values:
* {IP} - the attackers IP address
* {Port}- the port being attacked
* {Name}- the name of the alias being used
* {ISP} - the name of the Internet service provider that the attacker is using will be injected
* {Country} - the country name will be injected
* to personalize the message or leave it blank to record silently*/
options.DefaultReply = "This service is being monitored and we have detected your intentions attack {Name}" +
" via {IP}:{Port} to gain unlawful access to the system, please note that any unlawful" +
" activity will be reported to {ISP} as well as the relevant authorities in {Country}";
})
The above code assumes that you are using the FireWall from NuGet package Walter.Web.FireWall. If you are using any of the services that you are monitoring then map the default ports to custom ports on your router there are 2 steps for this:
- Map the custom port on the router, an example map 222 to port 22
- Use port 222 to connect using SSH
Please note that a lot of attackers are looking for victims using port scanners to target venerable IP addresses before attacking a system. You can have a look here and see how these attacks are being executed.
Product | Versions Compatible and additional computed target framework versions. |
---|---|
.NET | net6.0 is compatible. net6.0-android was computed. net6.0-ios was computed. net6.0-maccatalyst was computed. net6.0-macos was computed. net6.0-tvos was computed. net6.0-windows was computed. net7.0 is compatible. net7.0-android was computed. net7.0-ios was computed. net7.0-maccatalyst was computed. net7.0-macos was computed. net7.0-tvos was computed. net7.0-windows was computed. net8.0 was computed. net8.0-android was computed. net8.0-browser was computed. net8.0-ios was computed. net8.0-maccatalyst was computed. net8.0-macos was computed. net8.0-tvos was computed. net8.0-windows was computed. |
-
net6.0
- Microsoft.Extensions.Configuration.Binder (>= 7.0.4)
- System.IO.Pipelines (>= 7.0.0)
- Walter.Net.LookWhosTalking (>= 2023.10.12.1926)
- Walter.Net.Networking (>= 2023.10.12.1926)
-
net7.0
- Microsoft.Extensions.Configuration.Binder (>= 7.0.4)
- System.IO.Pipelines (>= 7.0.0)
- Walter.Net.LookWhosTalking (>= 2023.10.12.1926)
- Walter.Net.Networking (>= 2023.10.12.1926)
NuGet packages (1)
Showing the top 1 NuGet packages that depend on Walter.Net.HoneyPot:
Package | Downloads |
---|---|
Walter.Web.FireWall
Enhance .NET applications with a robust firewall, designed as middleware and IActionFilter, protecting against CVE attacks, web scraping, and phishing. Configurable via annotations and a rule engine services.AddFireWall(FireWallTrial.License, FireWallTrial.DomainKey , domainName: new Uri("https://www.your-domain.com", UriKind.Absolute) , options => { //your options }); Have a look at the GitHub samples at https://github.com/ASP-WAF/FireWall and https://github.com/ASP-WAF/FireWall/wiki to see how to use the firewall in applications. You can view the firewall in action using https://www.asp-waf.com/Firewall You can get started with the firewall using the samples shown in https://www.asp-waf.com/download/ASP-WAF-FireWall-Getting-Started.pdf as well as the on line documentation at https://firewallapi.asp-waf.com/ |
GitHub repositories
This package is not used by any popular GitHub repositories.
Version | Downloads | Last updated |
---|---|---|
2024.11.15.421 | 58 | 11/15/2024 |
2024.11.11.1334 | 40 | 11/14/2024 |
2024.11.6.1222 | 194 | 11/6/2024 |
2024.10.28.1605 | 233 | 10/28/2024 |
2024.10.28.1335 | 191 | 10/28/2024 |
2024.10.19.1525 | 202 | 10/20/2024 |
2024.10.18.1315 | 214 | 10/18/2024 |
2024.9.27.1406 | 213 | 9/27/2024 |
2024.9.17.1417 | 253 | 9/17/2024 |
2024.9.12.1923 | 278 | 9/12/2024 |
2024.9.6.1352 | 291 | 9/7/2024 |
2024.9.1.1159 | 281 | 9/1/2024 |
2024.8.26.1150 | 293 | 8/26/2024 |
2024.8.19.1411 | 299 | 8/19/2024 |
2024.8.17.1000 | 299 | 8/17/2024 |
2024.8.12.1622 | 294 | 8/13/2024 |
2024.8.5.1010 | 259 | 8/5/2024 |
2024.8.1.1545 | 319 | 8/16/2024 |
2024.7.28.629 | 143 | 7/28/2024 |
2024.7.26.1512 | 163 | 7/26/2024 |
2024.7.26.828 | 141 | 7/26/2024 |
2024.7.11.1604 | 263 | 7/11/2024 |
2024.7.9.1520 | 253 | 7/9/2024 |
2024.7.4.1425 | 262 | 7/4/2024 |
2024.7.3.1249 | 262 | 7/3/2024 |
2024.7.2.1536 | 292 | 7/2/2024 |
2024.6.28.953 | 282 | 6/28/2024 |
2024.6.6.1320 | 113 | 6/8/2024 |
2024.5.15.1634 | 99 | 5/15/2024 |
2023.11.13.1117 | 1,623 | 11/13/2023 |
2023.10.26.1502 | 1,542 | 10/29/2023 |
2023.10.12.1926 | 1,679 | 10/12/2023 |
2023.9.14.812 | 1,806 | 9/14/2023 |
2023.9.7.1748 | 1,809 | 9/7/2023 |
2023.9.7.1241 | 1,792 | 9/7/2023 |
2023.9.6.1001 | 1,774 | 9/6/2023 |
2023.9.5.1246 | 1,796 | 9/5/2023 |
2023.9.5.1032 | 1,777 | 9/5/2023 |
2023.8.31.1522 | 1,852 | 8/31/2023 |
2023.8.29.1040 | 1,859 | 8/29/2023 |
2023.8.17.901 | 1,918 | 8/17/2023 |
2023.8.9.1314 | 2,016 | 8/9/2023 |
2023.8.2.750 | 2,100 | 8/2/2023 |
2023.7.12.830 | 2,067 | 7/12/2023 |
2023.7.5.1419 | 2,159 | 7/6/2023 |
2023.6.14.1628 | 2,185 | 6/14/2023 |
2023.6.11.1304 | 2,313 | 6/11/2023 |
2023.5.30.1640 | 2,232 | 5/30/2023 |
2023.5.4.1552 | 2,335 | 5/4/2023 |
2023.5.1.1524 | 2,282 | 5/1/2023 |
2023.4.29.910 | 2,489 | 4/29/2023 |
2023.4.12.1236 | 2,507 | 4/12/2023 |
2023.3.22.1456 | 2,621 | 3/22/2023 |
2023.3.14.1356 | 2,748 | 3/14/2023 |
2023.3.1.810 | 2,776 | 3/1/2023 |
2023.2.25.11857 | 2,782 | 2/25/2023 |
2023.2.22.27 | 2,779 | 2/22/2023 |
2023.2.15.1413 | 2,845 | 2/15/2023 |
2023.2.11.1628 | 2,906 | 2/11/2023 |
2023.1.11.534 | 3,035 | 1/11/2023 |
2022.12.30.711 | 3,110 | 12/30/2022 |
2022.12.16.1536 | 970 | 12/16/2022 |
2022.12.15.1241 | 913 | 12/16/2022 |
2022.12.15.1108 | 3,103 | 12/15/2022 |
2022.12.14.648 | 3,188 | 12/14/2022 |
2022.11.27.1059 | 3,210 | 11/27/2022 |
2022.11.21.338 | 3,281 | 11/21/2022 |
2022.11.14.1819 | 3,377 | 11/14/2022 |
2022.11.13.917 | 3,349 | 11/13/2022 |
2022.11.7.1632 | 1,016 | 11/13/2022 |
2022.10.31.740 | 5,983 | 11/1/2022 |
2022.10.15.652 | 6,502 | 10/15/2022 |
2022.10.1.810 | 6,816 | 10/1/2022 |
2022.9.26.1444 | 6,861 | 9/26/2022 |
2022.9.14.1508 | 6,985 | 9/14/2022 |
2022.9.14.809 | 7,067 | 9/14/2022 |
2022.9.8.1009 | 7,179 | 9/8/2022 |
2022.8.20.1007 | 7,075 | 8/20/2022 |
2022.8.1.1 | 7,182 | 7/31/2022 |
2022.7.1300 | 7,411 | 7/1/2022 |
2022.7.31.1016 | 7,279 | 7/31/2022 |
2022.7.15.841 | 7,287 | 7/15/2022 |
2022.6.21.647 | 7,270 | 6/21/2022 |
2022.5.18.638 | 7,290 | 5/19/2022 |
2022.5.16.853 | 7,419 | 5/19/2022 |
2022.5.16.816 | 7,399 | 5/16/2022 |
2022.5.4.1010 | 7,345 | 5/4/2022 |
2022.4.10.947 | 7,856 | 4/10/2022 |
2022.4.10.925 | 7,802 | 4/10/2022 |
2022.4.10.828 | 7,761 | 4/10/2022 |
2022.4.1.1545 | 8,004 | 4/1/2022 |
2022.3.31.823 | 6,850 | 3/31/2022 |
2022.3.26.1103 | 7,993 | 3/26/2022 |
2022.3.26.820 | 7,660 | 3/26/2022 |
2022.3.25.840 | 7,039 | 3/26/2022 |
2022.3.24.1701 | 1,234 | 3/25/2022 |
2022.2.16.1131 | 8,185 | 2/17/2022 |
2022.2.16.834 | 8,009 | 2/17/2022 |
2022.2.15.824 | 2,153 | 2/17/2022 |
2022.2.11.1452 | 2,280 | 2/17/2022 |
2022.2.11.931 | 2,088 | 2/17/2022 |
2022.2.5.1114 | 8,269 | 2/5/2022 |
2022.1.17.1158 | 8,046 | 1/17/2022 |
2022.1.10.1505 | 8,436 | 1/10/2022 |
2022.1.10.537 | 8,422 | 1/10/2022 |
2022.1.5.1139 | 7,857 | 1/8/2022 |
2021.12.28.1452 | 8,903 | 12/28/2021 |
2021.12.16.812 | 8,517 | 12/16/2021 |
2021.11.23.1528 | 14,786 | 11/24/2021 |
2021.11.21.925 | 14,758 | 11/22/2021 |
2021.11.19.1503 | 1,013 | 11/22/2021 |
2021.11.19.847 | 9,651 | 11/19/2021 |
2021.11.18.1824 | 9,048 | 11/16/2021 |
2021.11.10.852 | 9,851 | 11/10/2021 |
2021.11.9.2021 | 9,406 | 11/9/2021 |
2021.11.8.2109 | 7,125 | 11/9/2021 |
2021.11.8.1612 | 7,673 | 11/8/2021 |
2021.11.7.1021 | 7,746 | 11/8/2021 |
2021.11.3.1612 | 8,022 | 11/4/2021 |
2021.11.1.1102 | 6,542 | 11/1/2021 |
2021.10.25.1206 | 8,091 | 10/25/2021 |
2021.10.23.1310 | 7,937 | 10/25/2021 |
2021.10.19.1522 | 7,969 | 10/19/2021 |
2021.10.16.1325 | 7,884 | 10/18/2021 |
2021.10.9.1119 | 238 | 10/9/2024 |
2021.10.6.1546 | 7,906 | 10/6/2021 |
2021.10.5.1450 | 8,088 | 10/5/2021 |
2021.10.4.1155 | 8,094 | 10/5/2021 |
2021.10.4.807 | 1,078 | 10/5/2021 |
2021.10.1.753 | 8,120 | 10/1/2021 |
2021.9.27.1005 | 7,531 | 9/28/2021 |
2021.9.26.1913 | 8,159 | 9/26/2021 |
2021.9.19.1015 | 7,843 | 9/19/2021 |
2021.9.17.1702 | 4,717 | 9/17/2021 |
2021.9.17.1449 | 10,690 | 9/17/2021 |
2021.9.13.1600 | 6,088 | 9/13/2021 |
2021.9.12.1100 | 4,466 | 9/13/2021 |
2021.9.11.2004 | 7,389 | 9/11/2021 |
2021.9.9.1110 | 7,902 | 9/9/2021 |
2021.9.7.1901 | 8,038 | 9/8/2021 |
2021.9.7.1121 | 8,164 | 9/7/2021 |
2021.9.7.927 | 1,055 | 9/7/2021 |
2021.9.6.1518 | 7,590 | 9/7/2021 |
2021.9.4.1124 | 7,964 | 9/4/2021 |
2021.9.2.708 | 7,683 | 9/4/2021 |
2021.9.0.1259 | 7,608 | 9/2/2021 |
2021.8.2200 | 7,099 | 8/23/2021 |
2021.8.2100 | 7,943 | 8/23/2021 |
2021.8.22.900 | 8,129 | 8/22/2021 |
2021.8.18.1500 | 8,062 | 8/18/2021 |
2021.8.18.930 | 7,994 | 8/18/2021 |
2021.8.14.1600 | 7,997 | 8/16/2021 |
2021.8.14.829 | 3,856 | 8/14/2021 |
2021.8.9.1105 | 8,042 | 8/9/2021 |
2021.8.8.1612 | 7,744 | 8/8/2021 |
2021.8.8.1138 | 6,991 | 8/8/2021 |
2021.8.6.1044 | 7,718 | 8/6/2021 |
2021.8.4.1355 | 8,317 | 8/5/2021 |
2021.7.30.2118 | 8,224 | 7/31/2021 |
2021.7.27.926 | 8,180 | 7/28/2021 |
2021.7.23.931 | 8,373 | 7/26/2021 |
2021.7.22.1456 | 7,878 | 7/23/2021 |
2021.7.15.1547 | 7,999 | 7/15/2021 |
2021.7.13.812 | 7,802 | 7/13/2021 |
2021.7.8.1527 | 8,115 | 7/10/2021 |
2021.7.5.1649 | 7,123 | 7/5/2021 |
2021.6.29.1453 | 8,314 | 6/30/2021 |
2021.6.26.1753 | 8,587 | 6/27/2021 |
2021.6.25.1849 | 8,187 | 6/25/2021 |
2021.6.24.1518 | 8,166 | 6/24/2021 |
2021.6.20.729 | 15,594 | 6/20/2021 |
2021.6.14.2025 | 8,356 | 6/15/2021 |
2021.6.13.2035 | 8,640 | 6/14/2021 |
2021.6.12.1154 | 8,010 | 6/13/2021 |
2021.6.9.1120 | 8,387 | 6/9/2021 |
2021.6.7.2103 | 1,087 | 6/7/2021 |
2021.6.3.1509 | 7,985 | 6/3/2021 |
2021.5.31.1533 | 8,238 | 5/31/2021 |
2021.5.31.1415 | 8,215 | 5/31/2021 |
2021.5.25.1732 | 7,182 | 5/25/2021 |
2021.5.24.1128 | 7,925 | 5/24/2021 |
2021.5.24.1019 | 7,806 | 5/24/2021 |
2021.5.12.1054 | 7,806 | 5/12/2021 |
2021.5.12.637 | 6,161 | 5/12/2021 |
2021.5.10.1442 | 7,258 | 5/11/2021 |
2021.5.8.1226 | 7,742 | 5/8/2021 |
Major releases that add functionality other than optimization and minor bug fixing
12 October 2023
- Build using SDK-7.0.402 and SDK-6.0.415
- Update Package references
14 September 2023
- SDK 7.0.401/SDK 6.0.414
- Update to new NuGet Packages
12 July 2023
- Update to SDK SP 6.0.412. and 7.0.306
- Update package references
14 June 2023
- Update due to SDK Update 7.0.304, and 6.0.410
5 May 2023
- Update due to new Obfuscation tool update
12 April 2023
- Update to a new .net 7.0.5 SDK release
14 Mar 2023
- Update NuGet package refferences
22 Feb 2023
- Axel Imani Release (Go live)
15 February 2023
- Update to .net 6.0.406 and 7.0.3
11 January 2023
- update to 7.0.2, 6.0.13 SDK and build tools for 17.4.4
14 December 2022
- Update to .Net SDK 3.1.426, 6.0.404 and 7.0.101
7 December 2022
- re-enable support for .net standard 2.1
21 November 2022
- Update to integrate the .net 7.0 cypher package release
- Update package references
14 November 2022
- Update NuGet Packages
6 November 2022
- Add support for .Net 7
15 November 2022
- Update NuGet package references
1 October 2022
- Update build with new SDK
- Update code sign certificates
14 September 2022
- Update to include new package 6.0.X and Microsoft CVE-2022-38013
02 September 2022
- Please make sure to update servers using this packages due to a security bug in .net
> System.Security.Cryptography.Xml 4.5.0 Moderate https://github.com/advisories/GHSA-2m65-m22p-9wjw
> System.Text.Encodings.Web 4.5.0 Critical https://github.com/advisories/GHSA-ghhp-997w-qr28
15 June 2022
- Update to support .net 6.0.7 and 3.1.27
- Update package references
21 June 2022
- Update package references
- Update compiler warning
4 May 2022
- Update NuGet References
- Update API definition
15 March 2022
- update to 6.0.3
5 March add base classes used by IDPS framework
- Service discovery updates
24 January 2022
- Add Property monitoring, changing properties at runtime will alter the listening scope and definition
- Allow adding and removing listener while the service is active
- Allow excursive or shared use of ports
16 December 2021
- Update to .Net SDK update 14 December for .NET CORE 3.1.416, and .NET 5.0.404 and 6.0.101
9 November 2021
- Fix package dependency on vulnerable packages from Microsoft by upgrading vulnerable packages
08 November 2021
- Update to .Net NuGet packages .NET 6.0.0, .NET 5.0.403 and core 3.1.415
3 November 2021
- Trigger a on keyword events when a exploit was detected with a given word in the stream send to the socket
2 November 2021
- update port mapping allowing for binding ports from configuration file skipping non-mapped ports with a value of 0
11 October 2021
- CodeSign the binaries as well as the NuGet package for executing in a trust-platform
1 October 2021
- Add additional blocking reason for firewall rule engine to use when getting a port scan or a port exploit in IHoneyPotPortDetection
- Add support for Hex-Dump reading the received data making the data human readable
- Add abstract of the block reason to IHoneyPotPortDetection
- Update capturing missing intercept locations in the report API
26 September 2021
- Update process handling to store actual response not the response template
- Add Date-time stamp for each triggered contact
19 September 2021
- Update NuGet packages release for .Net 5.0.10
4 September 2021
- Add default port configuration for WAC and Tomcat
8 Aug 2021
- update to .NET 6.0 SDK (v6.0.100-preview.6)
30 June 2021
- Add .Net 6.0 binaries to the nuget package
23 June 2021
- Save native attack stream in IHoneyPotPortDetection as Base64 string allowing for attack-replay
15 June 2021
- Update to .Net Core 3.1.17 and .Net 5.0.8 SDK
19 June 2020
- Record data send to the honey-pot based on text encoding detection text
11 June 2021
- Update store GuardResponse in data tables
- Add trace route to detected incident if the option is set
09 June 2021
- Update to .Net SDK 5.0.301 and 3.1.410
07 June 2021
- Update NuGet Package references
31 May 2021
- Update to more efficiently extract WHOIS data for more possible attackers
12 April 2021
- Update to new code base after .net security violation fix
10 May 2021
- Update Database based storage
05 April 2021
- Update process data processing
- Log requests that do not send data
22 March 2021 - performance update
- Logging update