Hacking Tools

DICOMHawk – A Honeypot For Secure DICOM Server Monitoring

DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions.

Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.

Features

  • DICOM Server Simulation: Supports C-ECHO, C-FIND, and C-STORE operations to simulate a realistic DICOM server environment.
  • Logging: Detailed logging of DICOM associations, DIMSE messages, and event-specific data to track and analyze potential attacks.
  • Web Interface: A user-friendly web interface to view server status, active associations, and logs.
  • Custom Handlers: Easily extendable to support additional DICOM services and custom logging or handling requirements.

Getting Started

Prerequisites

  • Docker and Docker Compose installed on your machine
  • DCMTK tools installed on your local machine for testing

Installation

Clone the repository:

    git clone https://github.com/gtheodoridis/DICOMHawk.git
    cd dicomhawk

    Start the services with Docker Compose:

    docker-compose up -d
    1. This command starts the Flask application and a log server in detached mode. The web interface is accessible on port 5000, and the DICOM server listens on port 11112. Alternatively, port 104 is also applicable for DICOM (ACR-NEMA).

    Usage

    Access the Web Interface:

    Open a web browser and go to http://127.0.0.1:5000 to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.

    Test the DICOM Server:

    Use DCMTK tools to interact with the DICOM server.

    • C-ECHO (DICOM Echo Test):
    echoscu 127.0.0.1 11112

    For more information click here.

    Tamil S

    Tamil has a great interest in the fields of Cyber Security, OSINT, and CTF projects. Currently, he is deeply involved in researching and publishing various security tools with Kali Linux Tutorials, which is quite fascinating.

    Recent Posts

    Stratus Red Team – Advancing Threat Detection And Offensive Testing In Cloud Environments

    Stratus Red Team is a cutting-edge tool designed to enhance cloud security by simulating granular…

    2 hours ago

    Bomber : Navigating Security Vulnerabilities In SBOMs

    bomber is an application that scans SBOMs for security vulnerabilities. So you've asked a vendor…

    4 days ago

    EmbedPayloadInPng : A Guide To Embedding And Extracting Encrypted Payloads In PNG Files

    Embed a payload within a PNG file by splitting the payload across multiple IDAT sections.…

    4 days ago

    Exploit Street – Navigating The New Terrain Of Windows LPEs

    Exploit-Street, where we dive into the ever-evolving world of cybersecurity with a focus on Local…

    6 days ago

    ShadowDumper – Advanced Techniques For LSASS Memory Extraction

    Shadow Dumper is a powerful tool used to dump LSASS (Local Security Authority Subsystem Service)…

    7 days ago

    Shadow-rs : Harnessing Rust’s Power For Kernel-Level Security Research

    shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…

    3 weeks ago