Advertisement
The_KGB

[Python] Honeypot

Apr 3rd, 2012
266
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
Python 2.41 KB | None | 0 0
  1. rom time import time, ctime
  2.  
  3. if len(sys.argv) != 3:
  4.    print "\nUsage: ./honeypot.py <port> <file to save attempts>"
  5.    print "Ex: ./honeypot.py 21 attacks.txt\n"
  6.    sys.exit(1)
  7.    
  8. banner = raw_input("\nPlease Enter Banner: ")
  9.  
  10. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  11. s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR,1)
  12. s.bind(("", int(sys.argv[1])))
  13. print "\n Scan started at " , ctime(time())
  14. print "\n[+] Waiting for connections...\n"
  15. s.listen(5)
  16.  
  17. while 1:
  18.    try:
  19.       (clientsock, clientaddr) = s.accept()
  20.       print "\a"*5  #Setup to beep 5 times on connection
  21.       clienthost = clientsock.getpeername()[0]
  22.       clientport = clientsock.getpeername()[1]
  23.       file = open(sys.argv[2], "a")  #Logs remote ip/potrt
  24.       print "-"*45
  25.       print "[-] Connection attempt:",clienthost+":"+str(clientport)
  26.       file.writelines("\n"+clienthost+":"+str(clientport))
  27.       clientsock.send("\n"+banner+"\n\n")
  28.       resp = clientsock.recv(1024)
  29.       clientsock.send("\nIllegal Access, your IP ["+clienthost+"] has
  30. been logged.\n\n")
  31.       clientsock.close()
  32.       file.close()
  33.    except(KeyboardInterrupt):
  34.       print "\n[-] Exiting:",timer()
  35.       sys.exit(1)
  36. import socket , string , sys
  37. from time import time, ctime
  38.  
  39. if len(sys.argv) != 3:
  40.    print "\nUsage: ./honeypot.py <port> <file to save attempts>"
  41.    print "Ex: ./honeypot.py 21 attacks.txt\n"
  42.    sys.exit(1)
  43.    
  44. banner = raw_input("\nPlease Enter Banner: ")
  45.  
  46. s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
  47. s.setsockopt(socket.SOL_SOCKET, socket.SO_REUSEADDR,1)
  48. s.bind(("", int(sys.argv[1])))
  49. print "\n Scan started at " , ctime(time())
  50. print "\n[+] Waiting for connections...\n"
  51. s.listen(5)
  52.  
  53. while 1:
  54.    try:
  55.       (clientsock, clientaddr) = s.accept()
  56.       print "\a"*5  #Setup to beep 5 times on connection
  57.       clienthost = clientsock.getpeername()[0]
  58.       clientport = clientsock.getpeername()[1]
  59.       file = open(sys.argv[2], "a")  #Logs remote ip/potrt
  60.       print "-"*45
  61.       print "[-] Connection attempt:",clienthost+":"+str(clientport)
  62.       file.writelines("\n"+clienthost+":"+str(clientport))
  63.       clientsock.send("\n"+banner+"\n\n")
  64.       resp = clientsock.recv(1024)
  65.       clientsock.send("\nIllegal Access, your IP ["+clienthost+"] has
  66. been logged.\n\n")
  67.       clientsock.close()
  68.       file.close()
  69.    except(KeyboardInterrupt):
  70.       print "\n[-] Exiting:",timer()
  71.       sys.exit(1)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement