this post was submitted on 05 Sep 2023
54 points (92.2% liked)

Selfhosted

39435 readers
6 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

but before I do, I figured I'd ask if anyone's aware of any tools/software that covers my basic needs of setting something basic that may alert me if there are any intruders in the network?

Needs:

  1. Fake ssh login that can trigger a script so I can take care of the rest.
  2. Fake network share (cifs/samba) that can trigger a script if anything tries to access it.

Would be great if there are any docker images I can just pull, make some minor edits, and run.

Thanks!

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 22 points 1 year ago (5 children)
[–] [email protected] 28 points 1 year ago (1 children)

I plan on making it available inside my own network, not public. This way if someone makes it past my security, I at least have something that might "catch" them in the act and disable my network so I can intervene. Just another security layer.

[–] [email protected] 3 points 1 year ago

I have never thought about doing this... But this is actually such a good idea. I'm probably going to set this up myself

[–] [email protected] 20 points 1 year ago (1 children)

If you place this on the inside of your network and it triggers, youre either compromised or a scanner/ person triggered it.

[–] [email protected] 1 points 1 year ago

That's the idea I think

[–] recursive_recursion 17 points 1 year ago* (last edited 1 year ago)

one of the best ways to protect your friends is to leave juicy bait that only zero-sum people would try to steal

plus wasting malicious user's time also provides multiple benefits such as reducing the prevalence of spam and DDoS attacks

[–] [email protected] 9 points 1 year ago

Do you not feel the itch of curiosity?

[–] [email protected] 3 points 1 year ago

FOR SCIENCE!1!!