mirror of
https://gitee.com/lauix/HFish
synced 2025-02-23 19:22:14 +08:00
2.1 KiB
2.1 KiB
SSH蜜罐
在终端里,尝试连接蜜罐的ssh端口,会显示“Permission denied, please try again.”

这时攻击列表会记录下所有测试过的用户名和密码

FTP蜜罐
用FTP终端尝试连接FTP蜜罐端口,会在攻击列表中出现FTP蜜罐报警

HTTP蜜罐
HTTP蜜罐为http代理蜜罐,利用http代理工具连接蜜罐端口

攻击列表中的显示信息如下

TELNET蜜罐
利用TELNET应用连接蜜罐端口

攻击列表中显示信息如下

MYSQL蜜罐
用MYSQL工具连接蜜罐对应端口
WEB蜜罐
WEB蜜罐用浏览器访问相应的端口,并尝试输入【用户名】和【密码】后

会提示用户名和密码错误

服务端后台会获取攻击者用于尝试的用户名和密码
