Tool and Usage
The sshesame tool provides an SSH honeypot. It accepts connections and then logs any commands that are tried to be executed on the host system.
Why this tool?
A honeypot can provide valuable insights on commands that automated scripts perform or attackers. By running a honeypot like sshesame, connection details and commands are stored for later analysis. The system itself won't execute the actual commands, to prevent any damage to it.
Usage and audience
sshesame is commonly used for learning or threat discovery. Target users for this tool are security professionals and system administrators.
- + The source code of this software is available
- - No releases on GitHub available
Author and Maintainers
Sshesame is under development by Kristóf Jakab.
Support operating systems
Sshesame is known to work on Linux.