The Simple LDAP Honeypot Server is a specialized tool created for cybersecurity experts and hobbyists to observe and analyze LDAP-based network interactions. Written in Python and utilizing the Twisted framework, this script simulates an LDAP server to log unauthorized access attempts and credentials, offering valuable insights into potential network vulnerabilities and intrusion attempts.
- Low-Interaction Honeypot: Effectively imitates an LDAP server, focusing on logging authentication attempts.
- Flexible Configuration: Easily modify host and port settings through command-line arguments.
- Comprehensive Logging: Captures detailed information about LDAP queries, including usernames and passwords.
- Real-Time Monitoring: Instantly logs and reports LDAP interaction, aiding in prompt detection of suspicious activities.
- Educational Purpose: Serves as an excellent resource for understanding LDAP security threats and reconnaissance tactics.
- Python 3.x
- Twisted Python library
To set up the LDAP honeypot server, follow these instructions:
git clone https://github.com/0xNslabs/ldap-honeypot.git
cd ldap-honeypot
pip install twisted
Launch the server with optional parameters for the host and port. The default settings bind the server to all interfaces (0.0.0.0) on port 389.
python3 ldap.py --host 0.0.0.0 --port 389
The LDAP honeypot logs all captured interactions in ldap_honeypot.log, providing a record of authentication attempts and LDAP queries for further analysis.
The above image showcases the Simple LDAP Honeypot Server in action, capturing real-time LDAP queries and credentials.
Check out the other honeypot services for monitoring various network protocols:
- DNS Honeypot - Monitors DNS interactions.
- FTP Honeypot - Simulates an FTP server.
- LDAP Honeypot - Mimics an LDAP server.
- HTTP Honeypot - Monitors HTTP interactions.
- HTTPS Honeypot - Monitors HTTPS interactions.
- NTP Honeypot - Monitors Network Time Protocol interactions.
- PostgreSQL Honeypot - Simulates a PostgreSQL database server.
- SIP Honeypot - Monitors SIP (Session Initiation Protocol) interactions.
- SSH Honeypot - Emulates an SSH server.
- TELNET Honeypot - Simulates a TELNET server.
- Caution: Use this honeypot in secure, controlled environments for research and educational purposes.
- Compliance: Ensure deployment is in line with local and international legal requirements.
This project is licensed under the MIT License. See the LICENSE file for more details.