HoneyCreds network credential injection to detect responder and other network poisoners.
Requirements
Requires Python 3.6+ (tested on Python 3.9)
smbprotocol
cffi
splunk-sdk
Installation
git clone https://github.com/Ben0xA/HoneyCreds.git
cd HoneyCreds
pip3 install -r requirements.txt
Running
python3 honeycreds.py
Settings
It is advised that you change these settings to best suit your environment.
Note: You can use an existing account, just change the password.
Change these in honeycreds.conf
Choose a legit looking username
def_username = ‘honeycreds’
This can match your current Short Domain
def_domain = ‘XQQX’
Make this whatever you want. Note: HTTP requests will send this in plaintext
def_password = ‘This is a honey cred account.’
The FQDN. Leave .local at the end.
def_fqdn = ‘xqqx.local’
The hostname that DOES NOT EXIST but looks legit.
def_hostname = ‘HNECRD01’
The log file and location
def_logfile = ‘honeycreds.log’
Ability to turn SMB or HTTP on or off. Set to “OFF” to turn off.
SMB = ‘ON’
HTTP = ‘ON’
The time to pause in seconds between requests.
SMB_SLEEP = 5
HTTP_SLEEP = 12
HikPwn: Comprehensive Guide to Scanning Hikvision Devices for Vulnerabilities If you’re searching for an efficient…
What Are Bash Comments? Comments in Bash scripts, are notes in your code that the…
When you write a Bash script in Linux, you want it to run correctly every…
Introduction If you’re new to Bash scripting, one of the first skills you’ll need is…
What is Bash Scripting? Bash scripting allows you to save multiple Linux commands in a file and…
When it comes to automating tasks on Linux, Bash scripting is an essential skill for both beginners…