The sys admin's daily grind: Glastopf
Hey, Honey
Good traps catch mice, and honeypots catch malicious scripts. Sys admin Charly resorts to a honeypot in this issue, which, although difficult to install, is easy to manage.
A honeypot is a service that runs on a server and simulates an insecure or incorrect configuration. The idea is to attract attackers with a supposedly vulnerable service and observe their intrusion attempts.
Glastopf [1] is such a honeypot, written in Python. It pretends to be a web server with a hugely vulnerable configuration. Unfortunately, most major distributions do not include a package for Glastopf. This prompted me to post a detailed installation guide as an Open Document text [2].
Raspberry Honey
After installation – in my case on a Raspberry Pi – the following command starts the server in the foreground:
glastopf-runner
Its output at the command line looks something like Listing 1 when started. If you see an error message stating Greenlet is not recent enough, your best approach is to install the latest development version with the command:
pip install greenlet==dev
Listing 1
Glastopf Starting
Now, when I surf to my Raspberry Pi with a browser, I can see the Glastopf homepage. It does not look particularly appealing (Figure 1), but this it totally irrelevant because it is only visited by automated attack tools.
Live and Frozen
Because Glastopf is running in the foreground, the vigilant admin can now follow attacks live on the console, such as the SQL injection attack in Listing 2. Additionally, Glastopf saves all the requests in a SQLite database in /opt/myhoneypot/db/
. To access it, SQLite 3 must be installed:
apt-get -fym install sqlite3
Listing 2
SQL Injection Attack
The following SQL command lists the fields id
, source
, request_url
, and pattern
for all instances of access to Glastopf – I abbreviated the input to a single line to save space:
sqlite> select id, source, request_url, pattern from events;[...] 9|10.0.0.50:52179|/?id=-1%20union%20select%201,2,3,4,5,6
Thanks to this logging, I can analyze the number and nature of the attacks on my honeypot. I hope more of those nasty critters come to visit!
Infos
- Glastopf: http://glastopf.org
- Installation guide: http://charly.in/glasinst (in German)
Buy this article as PDF
(incl. VAT)
Buy Linux Magazine
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Red Hat Adds New Deployment Option for Enterprise Linux Platforms
Red Hat has re-imagined enterprise Linux for an AI future with Image Mode.
-
OSJH and LPI Release 2024 Open Source Pros Job Survey Results
See what open source professionals look for in a new role.
-
Proton 9.0-1 Released to Improve Gaming with Steam
The latest release of Proton 9 adds several improvements and fixes an issue that has been problematic for Linux users.
-
So Long Neofetch and Thanks for the Info
Today is a day that every Linux user who enjoys bragging about their system(s) will mourn, as Neofetch has come to an end.
-
Ubuntu 24.04 Comes with a “Flaw"
If you're thinking you might want to upgrade from your current Ubuntu release to the latest, there's something you might want to consider before doing so.
-
Canonical Releases Ubuntu 24.04
After a brief pause because of the XZ vulnerability, Ubuntu 24.04 is now available for install.
-
Linux Servers Targeted by Akira Ransomware
A group of bad actors who have already extorted $42 million have their sights set on the Linux platform.
-
TUXEDO Computers Unveils Linux Laptop Featuring AMD Ryzen CPU
This latest release is the first laptop to include the new CPU from Ryzen and Linux preinstalled.
-
XZ Gets the All-Clear
The back door xz vulnerability has been officially reverted for Fedora 40 and versions 38 and 39 were never affected.
-
Canonical Collaborates with Qualcomm on New Venture
This new joint effort is geared toward bringing Ubuntu and Ubuntu Core to Qualcomm-powered devices.