MITRE ATT&CK technique T1110
Tactic: Credential Access
Platform: Windows, Linux, Mac
- Set up fake network services and accounts
- Glutton - All eating honeypot
- Heralding - Credentials catching honeypot, Supported protocols: ftp, telnet, ssh, pop3, pop3s, imap, imaps, smtp, postgresql, http and https.
- Cowrie - A medium interaction SSH and Telnet honeypot designed to log brute force attacks and the shell interaction performed by the attacker.
- Dionaea - Nepenthes successor, Supported protocols: smb, sip, ftp, tftp, mssql, mysql, http, and some other protocols.
- Honeywords: Making Password-Cracking Detectable