https://github.com/aau-network-security/hostage

Low Interaction Mobile Honeypot

https://github.com/aau-network-security/hostage

Science Score: 26.0%

This score indicates how likely this project is to be science-related based on various indicators:

  • CITATION.cff file
  • codemeta.json file
    Found codemeta.json file
  • .zenodo.json file
    Found .zenodo.json file
  • DOI references
  • Academic publication links
  • Academic email domains
  • Institutional organization owner
  • JOSS paper metadata
  • Scientific vocabulary similarity
    Low similarity (9.0%) to scientific vocabulary

Keywords

android honeypot
Last synced: 6 months ago · JSON representation

Repository

Low Interaction Mobile Honeypot

Basic Info
Statistics
  • Stars: 94
  • Watchers: 6
  • Forks: 32
  • Open Issues: 72
  • Releases: 8
Topics
android honeypot
Created almost 6 years ago · Last pushed 8 months ago
Metadata Files
Readme Contributing License Code of conduct

README.md

alt text

HosTaGe - Honeypot-To-Go

Copyright (C) 2013-2021, Aalborg University (Denmark) and Technische Universität Darmstadt (Germany)

HosTaGe Video

HosTaGe is a lightweight, low-interaction, portable, and generic honeypot for mobile devices that aims on the detection of malicious, wireless network environments. As most malware propagate over the network via specific protocols, a low-interaction honeypot located at a mobile device can check wireless networks for actively propagating malware. We envision such honeypots running on all kinds of mobile devices, e.g., smartphones and tablets, to provide a quick assessment on the potential security state of a network.

HosTaGe emulates the following protocols as of the latest version: AMQP, COAP, ECHO, FTP, HTTP, HTTPS, MySQL, MQTT, MODBUS, S7COMM, SNMP, SIP, SMB, SSH, SMTP and TELNET

Download from Play Store!

The stable release of HosTaGe can be installed from Google Play Store. Play Store Link or, Scan the QR code below from your Android device.

QR

References

The research behind HosTaGe has been published and presented in a number of scientific and industrial conferences. Below you can find some selected papers:

[1] Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Mihai Plasoianu, Wulf Pfeiffer, Lars Pandikow, Max Mühlhäuser: This Network is Infected: HosTaGe – a Low-Interaction Honeypot for Mobile Devices. SPSM@CCS 2013:43-48

[2] Emmanouil Vasilomanolakis, Shankar Karuppayah, Mathias Fischer, Max Mühlhäuser: HosTaGe: a Mobile Honeypot for Collaborative Defense. ACM SIN 2014:330-333

[3] Emmanouil Vasilomanolakis, Shreyas Srinivasa, Max Mühlhäuser: Did you really hack a nuclear power plant? An industrial control mobile honeypot. IEEE CNS 2015:729-730

[4] Emmanouil Vasilomanolakis, Shreyas Srinivasa, Carlos Garcia Cordero, Max Mühlhäuser: Multi-stage Attack Detection and Signature Generation with ICS Honeypots. IEEE/IFIP DISSECT@NOMS 2016:1227-1232

Download APK

HosTaGe-v2.2.11.apk Release-Notes(latest)

HosTaGe-v2.1.1.apk Release-Notes

HosTaGe-v2.0.0.apk Release-Notes

Wiki

The Wiki provides information on getting started and using the app. Wiki for HosTaGe can be found here: Wiki.

GUI

homescreen

Original Authors

Emmanouil Vasilomanolakis - idea, guidance and suggestions during development

Contributors

Shreyas Srinivasa, lead developer, Aalborg University and Technische Universität Darmstadt (Github - @sastry17)

Eirini Lygerou, GSoC 2020 Developer (Github - @irinil)

Mihai Plasoianu, student developer, Technische Universität Darmstadt

Wulf Pfeiffer, student developer, Technische Universität Darmstadt

Lars Pandikow, student developer, Technische Universität Darmstadt

Researchers

Shankar Karuppayah, mentoring, developer, Technische Universität Darmstadt

Mathias Fischer, mentoring, Universität Hamburg

Max Mühlhäuser, mentoring, Technische Universität Darmstadt

Carlos Garcia Cordero, mentoring, Technische Universität Darmstadt

Features of HoneyRJ were inspiration for this project. http://www.cse.wustl.edu/~jain/cse571-09/ftp/honey/manual.html\

Encryption for the SSH protocol were taken from Ganymed SSH-2 and slightly modified. http://code.google.com/p/ganymed-ssh-2/

GSoC 2020

The project was actively developed with participation in Google Summer of Code 2020. More information about GSoC2020 is here

HPFeeds

To access the hpfeeds from hostage please send an access request to hostage@es.aau.dk with your name and organization. Please note that access to the hpfeeds repository is provided only after an internal review.

Contact

Please use the Github issues to report any issues or for questions. Slack channel; Email

License & Distribution

Distributed under the MIT license. See LICENSE for license information.

Owner

  • Name: Network Security
  • Login: aau-network-security
  • Kind: organization
  • Email: cyber@es.aau.dk
  • Location: Aalborg

Network Security Group, Wireless Communication Systems at Aalborg University

GitHub Events

Total
  • Watch event: 7
  • Push event: 1
  • Pull request event: 1
  • Fork event: 1
Last Year
  • Watch event: 7
  • Push event: 1
  • Pull request event: 1
  • Fork event: 1

Dependencies

build.gradle maven
  • androidx.annotation:annotation 1.0.0 implementation
  • androidx.constraintlayout:constraintlayout 2.0.4 implementation
  • androidx.legacy:legacy-support-v4 1.0.0 implementation
  • androidx.multidex:multidex 2.0.0 implementation
  • androidx.preference:preference 1.1.1 implementation
  • com.github.Stericson:RootShell 1.6 implementation
  • com.github.Stericson:RootTools 5.0 implementation
  • com.github.tony19:logback-android 2.0.0 implementation
  • com.google.android.gms:play-services-analytics 17.0.0 implementation
  • com.google.android.gms:play-services-auth 19.0.0 implementation
  • com.google.android.gms:play-services-base 17.6.0 implementation
  • com.google.android.gms:play-services-basement 17.6.0 implementation
  • com.google.android.gms:play-services-location 18.0.0 implementation
  • com.google.android.gms:play-services-maps 17.0.1 implementation
  • com.google.android.gms:play-services-tasks 17.2.1 implementation
  • com.google.android.material:material 1.4.0-beta01 implementation
  • com.google.firebase:firebase-analytics 19.0.0 implementation
  • com.google.firebase:firebase-core 19.0.0 implementation
  • com.google.firebase:firebase-crashlytics 18.0.0 implementation
  • com.jaredrummler:android-device-names 2.0.0 implementation
  • com.mbed.java-coap:coap-core 5.0.0 implementation
  • eu.chainfire:libsuperuser 1.0.0.201704021214 implementation
  • io.moquette:moquette-broker 0.12.1 implementation
  • org.greenrobot:greendao 3.3.0 implementation
  • org.greenrobot:greendao-generator 3.3.0 implementation
  • org.roboguice:roboguice 4.0.0 implementation
  • androidx.test:core 1.2.0 testImplementation
  • junit:junit 4.13.2 testImplementation
  • org.mockito:mockito-core 3.10.0 testImplementation
  • org.powermock:powermock-api-mockito2 2.0.9 testImplementation
  • org.powermock:powermock-core 2.0.9 testImplementation
  • org.powermock:powermock-module-junit4 2.0.9 testImplementation
  • org.powermock:powermock-module-junit4-rule 2.0.9 testImplementation
  • org.robolectric:robolectric 4.4.1 testImplementation
src/test/java/liveAttack/requirements.txt pypi
  • CoAPthon3 ==1.0.1 test
  • aio-pika ==6.6.1 test
  • paho-mqtt ==1.3.0 test
  • requests ==2.24.0 test
  • smbprotocol ==1.1.0 test