Cyber security

HASH : Harnessing HTTP Agnostic Software Honeypots For Enhanced Cybersecurity

The main philosophy of HASH is to be easy to configure and flexible to mimic any software running on HTTP/HTTPs. With the minimum footprint possible to avoid being detected as honeypot.

Features

  • Single framework to deploy HTTP/HTTPs based honeypots
  • Easily configurable via YAML files
  • Built-in honeytraps
  • Powerful randomization based on fakerjs to avoid honeypot detection
  • Optionally, integration with Datadog to ingest and analyze honeypots logs and HTTP requests through APM

Getting Started

HASH is built using Node.js but it can mimic any web-based language / server based on the configuration. Read the full docs below.

Installation

You can Install it via NPM

npm install -g hash-honeypot

Or you can use it directly from docker

docker run --rm ghcr.io/datadog/hash help

Usage

Generate Honeypot Profile

HASH uses YAML files to configure how it simulate the desired software, The typical structure for the profile folder is the following

|____templates
|     |____resources
|     |     |____index.html
|     |     |____style.css
|     |     |____favicon.ico
|     |____404.yaml
|     |____default.yaml
|____init.yaml

For more information click here.

Varshini

Varshini is a Cyber Security expert in Threat Analysis, Vulnerability Assessment, and Research. Passionate about staying ahead of emerging Threats and Technologies.

Recent Posts

TruffleHog Burp Suite Extension : Enhancing Security With Automated Secret Detection

The TruffleHog Burp Suite Extension is a powerful tool designed to scan HTTP traffic within…

45 minutes ago

ps5Spoofer : Unlocking PS4 Game Compatibility On Your PS5

The ps5Spoofer is a tool designed for the PlayStation 5 (PS5) that patches the PS4…

4 hours ago

eWPTX Preparion : Essential Tools And Functions

The eWPTX (eLearnSecurity Web Application Penetration Tester Extreme) certification is a challenging credential that validates…

4 hours ago

REC2 : Rusty External Command And Control Tool

REC2, short for Rusty External Command and Control, is a sophisticated Command and Control (C2)…

4 hours ago

AMSI-Bypass-HWBP : A Tool For Evading AMSI Detection

AMSI (Antimalware Scan Interface) is a Windows feature designed to help protect systems from malware…

23 hours ago

BurpSuite-Xkeys : Mastering Key And Token Extraction For Web Security

Xkeys is a Burp Suite extension designed to extract interesting strings such as keys, secrets,…

23 hours ago