Kippo
OSSEC
Kippo | OSSEC | |
---|---|---|
4 | 12 | |
1,579 | 4,265 | |
- | 0.6% | |
2.7 | 4.5 | |
6 months ago | 2 months ago | |
Python | C | |
- | GNU General Public License v3.0 or later |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
Kippo
-
Session recording for Tailscale SSH in beta
In the old days I played with something like this: https://github.com/desaster/kippo
But a more modern alternative seems to be the container based approach outlined here. https://lwn.net/Articles/848291/
-
Any app out there to trap port scanners?
You could set up a honeypot such as https://github.com/desaster/kippo but that is not really going to "trap" or "bully" anyone. You're better off just properly securing your network and not trying to poke the hornet's nest
-
Honeypot
You could run your ssh server on a different port and run kippo on port 22.
- desaster/kippo - Kippo - SSH Honeypot
OSSEC
- Local ignore rule on manager not working
-
ClamWin ransomware?
Does the ossec system (www.ossec.net) not use ClamWin?
-
Where can I get hands on practice for cybersecurity as a beginner over internet for free?
OSSEC: https://www.ossec.net/ HIDS
- IDS Sistem
-
Active Response script for Cloudflare
Hi there, as per title i am trying to use this script: https://github.com/ossec/ossec-hids/blob/master/active-response/cloudflare-ban.sh
-
Ask HN: How to monitor the security of a personal VPS?
OSSEC is good for monitoring logs, system files, etc. as well as alerting (and blocking traffic if you want) when anything suspicious happens
Takes a bit of work to set up but is worth it and includes lots of basic checks by default
https://www.ossec.net/
-
Passive log analysis software
It's been a long time since I tried using OSSEC but maybe that would help. It's a Host-based IDS, rather than a network based IDS like Snort. Last time I checked you could point it towards your logs and it will parse them offline similar to how Snort can read a PCAP file.
-
Free EDR solutions
Not sure if it could be considered one but maybe OSSEC Host Intrusion Detection System might get you some.of the way can be found here
-
Intrusion detection software?
WAZUH (fork of OSSEC would be my first choice when it comes to Linux based HIDS (host based), and Snort or Suricata if you are looking for NIDS (network based). As well as Lynis for ensuring the setup of the host is as you intended.
- Software that tracks unauthorized user logins?
What are some alternatives?
Fail2Ban - Daemon to ban hosts that cause multiple authentication errors
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
Glastopf - Web Application Honeypot
Suricata - Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine developed by the OISF and the Suricata community.
pfSense - Main repository for pfSense
OSQuery - SQL powered operating system instrumentation, monitoring, and analytics.
Snort - Snort++
crowdsec - CrowdSec - the open-source and participative security solution offering crowdsourced protection against malicious IPs and access to the most advanced real-world CTI.