this post was submitted on 05 Sep 2023
54 points (92.2% liked)

Selfhosted

39435 readers
1 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 2 years ago
MODERATORS
 

but before I do, I figured I'd ask if anyone's aware of any tools/software that covers my basic needs of setting something basic that may alert me if there are any intruders in the network?

Needs:

  1. Fake ssh login that can trigger a script so I can take care of the rest.
  2. Fake network share (cifs/samba) that can trigger a script if anything tries to access it.

Would be great if there are any docker images I can just pull, make some minor edits, and run.

Thanks!

top 18 comments
sorted by: hot top controversial new old
[–] [email protected] 30 points 1 year ago

People were close, but what you actually want is OpenCanary. It fakes SSH and Samba services and can be configured to alert you when triggered.

[–] [email protected] 22 points 1 year ago (5 children)
[–] [email protected] 28 points 1 year ago (1 children)

I plan on making it available inside my own network, not public. This way if someone makes it past my security, I at least have something that might "catch" them in the act and disable my network so I can intervene. Just another security layer.

[–] [email protected] 3 points 1 year ago

I have never thought about doing this... But this is actually such a good idea. I'm probably going to set this up myself

[–] [email protected] 20 points 1 year ago (1 children)

If you place this on the inside of your network and it triggers, youre either compromised or a scanner/ person triggered it.

[–] [email protected] 1 points 1 year ago

That's the idea I think

[–] recursive_recursion 17 points 1 year ago* (last edited 1 year ago)

one of the best ways to protect your friends is to leave juicy bait that only zero-sum people would try to steal

plus wasting malicious user's time also provides multiple benefits such as reducing the prevalence of spam and DDoS attacks

[–] [email protected] 9 points 1 year ago

Do you not feel the itch of curiosity?

[–] [email protected] 3 points 1 year ago

FOR SCIENCE!1!!

[–] [email protected] 7 points 1 year ago (1 children)

I am not affiliated with them, but you can get a trigger file (Canary Token) from the people at Thinkst. I quickly looked around their site, and did not see how, but their adds say you can get them for free, without having to buy their canary hardware device.

[–] [email protected] 5 points 1 year ago* (last edited 1 year ago)

you can get them for free

https://canarytokens.org/generate should work just fine

[–] anzo 6 points 1 year ago
[–] [email protected] 5 points 1 year ago

You can also use something called canary tokens. You would put a file on a share that triggers an action to alert you.

[–] [email protected] 4 points 1 year ago

The Honeynet Project, related to the SANS Institute when I last checked, has a lot of resources on honeypots that are worth a look, if you haven't already.

[–] [email protected] 4 points 1 year ago

I'd like to create a funnypot

[–] [email protected] 1 points 1 year ago

Thinkst have also published opencanary which you can run yourself and contains a decent subset of what their hardware canaries run, including SSH and cifs.

[–] [email protected] 1 points 1 year ago
[–] [email protected] -1 points 1 year ago