Hacking Tools

DICOMHawk – A Honeypot For Secure DICOM Server Monitoring

DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.

Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.

Features

  • DICOM Server Simulation: Supports C-ECHO, C-FIND, and C-STORE operations to simulate a realistic DICOM server environment.
  • Logging: Detailed logging of DICOM associations, DIMSE messages, and event-specific data to track and analyze potential attacks.
  • Web Interface: A user-friendly web interface to view server status, active associations, and logs.
  • Custom Handlers: Easily extendable to support additional DICOM services and custom logging or handling requirements.

Getting Started

Prerequisites

  • Docker and Docker Compose installed on your machine
  • DCMTK tools installed on your local machine for testing

Installation

Clone the repository:

    git clone https://github.com/gtheodoridis/DICOMHawk.git
    cd dicomhawk

    Start the services with Docker Compose:

    docker-compose up -d
    1. This command starts the Flask application and a log server in detached mode. The web interface is accessible on port 5000, and the DICOM server listens on port 11112. Alternatively, port 104 is also applicable for DICOM (ACR-NEMA).

    Usage

    Access the Web Interface:

    Open a web browser and go to http://127.0.0.1:5000 to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.

    Test the DICOM Server:

    Use DCMTK tools to interact with the DICOM server.

    • C-ECHO (DICOM Echo Test):
    echoscu 127.0.0.1 11112

    For more information click here.

    Varshini

    Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

    Recent Posts

    GitButler : Revolutionizing Branch Management With Virtual Branches

    GitButler is a git client that lets you work on multiple branches at the same…

    9 hours ago

    Minegrief : Unpacking A Crafty Minecraft Malware

    Self-spreading to other Minecraft servers using an extendable, module-based lateral movement system. Crafty Controller Auth'd…

    9 hours ago

    ModTask – Task Scheduler Attack Tool

    ModTask is an advanced C# tool designed for red teaming operations, focusing on manipulating scheduled…

    2 days ago

    HellBunny : Advanced Shellcode Loader For EDR Evasio

    HellBunny is a malleable shellcode loader written in C and Assembly utilizing direct and indirect…

    2 days ago

    SharpRedirect : A Lightweight And Efficient .NET-Based TCP Redirector

    SharpRedirect is a simple .NET Framework-based redirector from a specified local port to a destination…

    2 days ago

    Flyphish : Mastering Cloud-Based Phishing Simulations For Security Assessments

    Flyphish is an Ansible playbook allowing cyber security consultants to deploy a phishing server in…

    3 days ago