- Logs all connections
- Logs usernames and passwords
- Never opens a shell no matter what
If you'd like to set this up yourself, you can download the complete source, or if you already have the source for openssh-4.4p1, and don't want to download the whole thing just for a few modifications you can get just the diff. Then run the following commands:
tar xzvf openssh-logger.tar.gz
cd openssh-logger
./configure --prefix /usr/honey/ \
--with-privsep-path=/usr/honey/chroot \
--with-pid-dir=/usr/honey/var/run
make
The purpose of putting it in a strange directory is that we don't want to hose your real ssh server. If that went well, run:
su
make install
touch /usr/honey/chroot/sshattacks.log
chown sshd:sshd /usr/honey/chroot/sshattacks.log
Remember: if you run a real ssh server, you'll want to change the port it listens on in your /etc/ssh/sshd_config. You can add section to your ~/.ssh/config like this:
so your client will connect to the correct server. Now everything should be set up and you should start seeing brute force attacks in /usr/honey/chroot/sshattacks.log in no more than a couple of days.
Host <hostname>
Port <real server's port>
Output will look something like this:
host: 10.0.0.100 port: 45677
user: root pass: root
user: root pass: t00r
user: root pass: r00t
Happy hunting!