Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems. It's relatively simple, run
./setup.py and hit yes, this will install Artillery in
/var/artillery and edit your
/etc/init.d/rc.local to start artillery on boot up.
It sets up multiple common ports that are attacked. If someone connects to these ports, it blacklists them forever (to remove blacklisted ip's, remove them from
It monitors what folders you specify, by default it checks
It monitors the SSH logs and looks for brute force attempts.
It will email you when attacks occur and let you know what the attack was.
Be sure to edit the
/var/artillery/config to turn on mail delivery, brute force attempt customizations, and what folders to monitor.
Bugs and enhancements
For bug reports or enhancements, please open an issue here https://github.com/trustedsec/artillery/issues
For those technical folks you can find all of the code in the following structure:
src/core.py- main central code reuse for things shared between each module
src/monitor.py- main monitoring module for changes to the filesystem
src/ssh_monitor.py- main monitoring module for SSH brute forcing
src/honeypot.py- main module for honeypot detection
src/harden.py- check for basic hardening to the OS
database/integrity.data- main database for maintaining sha512 hashes of filesystem
setup.py- copies files to
/etc/init.d/artilleryto ensure artillery starts per each reboot
Project Artillery - A project by Binary Defense Systems (https://www.binarydefense.com).
Binary Defense Systems (BDS) is a sister company of TrustedSec, LLC