Since the Hugo project is linked to sending events to the system Warden, it is necessary to apply for registration of the client in this system. There is a separate website, where you can find all the details.
Our virtual machine images include the software allowing automatic client registration into the Warden system. After the first start of the virtual machine, just answer a few questions, after which a request to register the honeypot into the system will be sent to us. If the honeypot is approved, the virtual machine will be set up within an hour; the Warden client certificate for data transmission will be downloaded, and the honeypot will begin capturing attacks and sending events. In case of any doubt, we will contact you back.
Each virtual machine should have its own Warden client.
You may start by downloading the VM package – in that case, you will need a hypervisor, to which you will import this machine.
Minimum requirements for running the VM:
The second option is that you will install the honeypots yourselves, and then you will just use our logging plugins. They will output IDEA events, which you would then send to Warden servers - you may use Warden Filer for this purpose. You may find the files in the Downloads section.
Honeypot can be operated both with a public IP address directly assigned to the system, or in the private IP address space as well, where you set up port forwarding (Destination NAT) from the public IP towards your private IP address.
If you use private IP addresses, then a proper detection of the public IPv4 is essential to provide accurate information in your events. If you decide to anonymize the IP address of your honeypots, then you do not need to worry about this.
Here follows the list of ports that our virtual machines open and that you should allow on your firewall.
Ports open:
Honeypot | Port | Direction | Description |
---|---|---|---|
Cowrie | 22 (TCP) | incoming | SSH |
Dionaea | 22 (TCP) | incoming | SSH (for VM management from your local network) |
Dionaea | 21 (TCP) | incoming | FTP, control channel |
Dionaea | random (TCP) | incoming | FTP, control channel for passive connections |
Dionaea | 1433 (TCP) | incoming | MS SQL |
Dionaea | 3306 (TCP) | incoming | MySQL |
Dionaea | 69 (UDP) | incoming | TFTP |
Outgoing connections:
Our VMs will make the following connections, which are necessary for its operation. Most of the hostnames mentioned resolve to a static IP.
The following connections can be seen only during registration and activation:
The Cowrie honeypot allows outgoing HTTP/HTTPS connections via simulated wget
and curl
commands. To gather additional data such as malware samples, these connections should be enabled, with appropriate restrictions to limit abuse. Although Cowrie code does not allow connections to the private networks (that means, it prohibits using address ranges defined in iana-ipv4-special-registry and iana-ipv6-special-registry), we strongly advise to always limit outgoing access from honeypot to your internal networks, either by using ACLs or appropriate firewall rules.