A medium interaction SSH honeypot that logs brute force attacks and attacker shell interactions.
Kippo is a medium interaction SSH honeypot that logs brute force attacks and captures the entire shell interaction performed by attackers. It creates a fake filesystem resembling a Debian installation to deceive attackers and study their techniques in a safe environment.
Security researchers, system administrators, and cybersecurity professionals who want to monitor and analyze SSH-based attacks on their networks.
Developers choose Kippo for its realistic deception capabilities, detailed session logging, and ability to capture attacker behavior without risking real systems, making it a valuable tool for threat intelligence.
Kippo - SSH Honeypot
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Emulates a full Debian 5.0 installation with customizable fake file contents, allowing attackers to 'cat' files like /etc/passwd for deceptive realism.
Stores session logs in UML-compatible format in the log/tty/ directory, enabling replay with original timings via utils/playlog.py for precise analysis.
Automatically saves files downloaded via wget to the dl/ folder, as noted in the features, facilitating forensic inspection of attacker activities.
Implements trickery such as preventing exit commands from working and fake SSH connections, misleading attackers into prolonged engagement.
Relies on Python 2.5+ and specific Twisted versions (8.0 to 15.1.0), which are deprecated and may harbor security vulnerabilities due to lack of updates.
The README directs users to a fork for recent development, indicating this version is no longer actively maintained or supported.
The FAQ only answers 'Maybe.' to security questions, lacking comprehensive documentation on risks, making it uncertain for safe deployment.