Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run ./setup.py
and hit yes, this will install Artillery in /var/artillery
and edit your /etc/init.d/rc.local
to start artillery on boot up.
-
It sets up multiple common ports that are attacked. If someone connects to these ports, it blacklists them forever (to remove blacklisted ip's, remove them from
/var/artillery/banlist.txt
) -
It monitors what folders you specify, by default it checks
/var/www
and/etc
for modifications. -
It monitors the SSH logs and looks for brute force attempts.
-
It will email you when attacks occur and let you know what the attack was.
Be sure to edit the /var/artillery/config
to turn on mail delivery, brute force attempt customizations, and what folders to monitor.
For bug reports or enhancements, please open an issue here https://github.com/trustedsec/artillery/issues
For those technical folks you can find all of the code in the following structure:
src/core.py
- main central code reuse for things shared between each modulesrc/monitor.py
- main monitoring module for changes to the filesystemsrc/ssh_monitor.py
- main monitoring module for SSH brute forcingsrc/honeypot.py
- main module for honeypot detectionsrc/harden.py
- check for basic hardening to the OSdatabase/integrity.data
- main database for maintaining sha512 hashes of filesystemsetup.py
- copies files to/var/artillery/
then edits/etc/init.d/artillery
to ensure artillery starts per each reboot
- Linux
- Windows
On windows to install pywin32 is needed.Install version that matches the version of python installed ex: 32/64 bit. Download files to location of your choice.open a cmd prompt browse to directory that files are located. To run type "python setup.py". You will be prompted for credentials if you are not an admin. Artillery wil be installed in "Program Files (x86). After setup you have option to launch program. included is a batch file to launch once it is installed it is located in install directory.Console logging must be enabled in config.
Message from https://github.com/russhaun
#5\25\17 #To all those that give a F#$%: Just so you are warned i plan on heavily commenting ay changes I make and why I made a particular change it helps me to remember where i am in the build. You might see random ideas if you like them message me if not. do what you will. If you have an idea message me. Delete what you dont want.I realise some of my methods mightnot be the best and i will make mistakes. I might break s#$% if i do sorry. If you have a better\cleaner way please tell me .I am just starting so any constructive critisism is welcome. If your a d@#$% with your comments i will just ignore you. My only goal is to make this better for all that use it. Eventually i will add a TODo for windows/linux ideas and will place in there. I have a few already Powershell backend maybe? idk we'll see.If you actually read this thankyou for your time
Project Artillery - A project by Binary Defense Systems (https://www.binarydefense.com).
Binary Defense Systems (BDS) is a sister company of TrustedSec, LLC