1
2
mirror of https://github.com/vimagick/dockerfiles synced 2024-06-16 03:48:44 +00:00
dockerfiles/cowrie/README.md

56 lines
1.1 KiB
Markdown
Raw Normal View History

2015-07-21 16:10:52 +00:00
cowrie
======
2015-11-25 01:42:37 +00:00
![](https://badge.imagelayers.io/vimagick/cowrie:latest.svg)
2017-11-05 13:12:30 +00:00
[Cowrie][1] is a medium interaction SSH honeypot designed to log brute force attacks
2015-07-21 16:10:52 +00:00
and, most importantly, the entire shell interaction performed by the attacker.
2017-11-05 13:12:30 +00:00
Cowrie is directly based on [Kippo][2] by Upi Tamminen (desaster).
2015-07-21 16:10:52 +00:00
## docker-compose.yml
2017-11-05 13:06:52 +00:00
```yaml
2020-11-05 11:22:21 +00:00
version: "3.8"
services:
cowrie:
image: cowrie/cowrie
ports:
- "2222:2222"
- "2223:2223"
volumes:
- cowrie-etc:/cowrie/cowrie-git/etc
- cowrie-var:/cowrie/cowrie-git/var
restart: unless-stopped
volumes:
cowrie-etc:
cowrie-var:
2015-07-21 16:10:52 +00:00
```
## server
2017-11-05 13:06:52 +00:00
```bash
2015-07-21 16:10:52 +00:00
$ docker-compose up -d
2020-11-05 11:22:21 +00:00
$ docker volume ls
$ docker volume inspect cowrie_cowrie-var
$ cd /var/lib/docker/volumes/cowrie_cowrie-etc/_data
$ cp cowrie.cfg.dist cowrie.cfg
$ cp userdb.example userdb.txt
$ cd /var/lib/docker/volumes/cowrie_cowrie-var/_data
$ tail -f log/cowrie/cowrie.json
2015-07-21 16:10:52 +00:00
```
## client
2017-11-05 13:06:52 +00:00
```bash
2015-07-21 16:10:52 +00:00
$ ssh -p 2222 root@server
2017-11-05 13:06:52 +00:00
$ telnet server 2223
2015-07-21 16:10:52 +00:00
```
2015-07-21 17:00:29 +00:00
> You can login as `root` with any password except `root` or `123456`.
2015-07-21 16:10:52 +00:00
[1]: https://github.com/micheloosterhof/cowrie
[2]: http://github.com/desaster/kippo/