Skip to content

Instantly share code, notes, and snippets.

@dustyfresh
Last active March 31, 2019 15:45
Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save dustyfresh/5a745d0251c5163ede8f9e897736e4b0 to your computer and use it in GitHub Desktop.
Save dustyfresh/5a745d0251c5163ede8f9e897736e4b0 to your computer and use it in GitHub Desktop.
log brute force traffic on telnet easily with miniboa
from miniboa import TelnetServer
import logging as logz
def on_connect(client):
logz.info('New connection from {}'.format(client.address))
clients.append(client)
# Fake login prompt
client.send('Login: ')
def on_disconnect(client):
logz.info('Client disconnected {}'.format(client.address))
if client in clients:
clients.remove(client)
def process(clients):
for client in clients:
if client.active and client.cmd_ready:
payload = client.get_command()
logz.info('{} - {}'.format(client.address, str(payload)))
# Fake password prompt
client.send('\nPassword: ')
client.password_mode_on()
if __name__ == '__main__':
logz.basicConfig(format='%(asctime)s - %(message)s', level=logz.INFO, filename='honey.log')
print('Starting telnet honeypot...')
clients = []
server = TelnetServer()
server = TelnetServer(
port=23,
address='0.0.0.0',
on_connect=on_connect,
on_disconnect=on_disconnect
)
while True:
server.poll()
process(clients)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment