Quick and dirty honeypot for CVE-2024-3273. This template can be used to setup a basic honeypot in ~10min.
TL;DR:
- Find (fofa, shodan, onyphe, ...).
- Clone it with the
wget_clone_http.sh
. - Manual tinkering to make the honeypot more realistic (cloning isn't perfect so some files 404).
- Add rule matching the exploit path (and exploit handling logic) to
server.py
. - Save and run!
Files are downloaded with the --save-headers
flag set (equivalent to curl
's --include
) to mimic the headers the server we're masquarading as would send.
Sources: