A honeypot is a cybersecurity mechanism designed to detect, deflect, or study attempts to gain unauthorized access to information systems. It is essentially a decoy system or resource set up to look like a legitimate target, but it is isolated and closely monitored.
Honeypots are often used in cybersecurity to strengthen defenses, identify vulnerabilities, and gather intelligence on attackers without compromising the actual infrastructure.
A decoy in cybersecurity is a false or deceptive system, network, or resource set up to attract attackers and mislead them away from valuable or critical assets. Decoys are part of deception technology, which aims to trick malicious actors into interacting with controlled, non-essential environments rather than real systems.
On the Dejavu Engine server, replace the add-server-decoys.php file with the file that integrates decoys MS17-010, SAMBA CVE-2017-7494, WSO2 CVE-2022-29464 on this project.
Decoys are deployed using Docker containers. You can integrate additional decoys as needed, as long as that image had CVEs.
Thank you Bhadresh Patel and Harish Ramadoss for creating this amazing project.