DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.
Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.
Clone the repository:
git clone https://github.com/gtheodoridis/DICOMHawk.git
cd dicomhawk
Start the services with Docker Compose:
docker-compose up -d
Access the Web Interface:
Open a web browser and go to http://127.0.0.1:5000
to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.
Test the DICOM Server:
Use DCMTK tools to interact with the DICOM server.
echoscu 127.0.0.1 11112
For more information click here.
Pystinger is a Python-based tool that enables SOCKS4 proxying and port mapping through webshells. It…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
Introduction When it comes to cybersecurity, speed and privacy are critical. Public vulnerability databases like…
If you are working with Linux or writing bash scripts, one of the most common…
What is a bash case statement? A bash case statement is a way to control…
Why Do We Check Files in Bash? When writing a Bash script, you often work…