Terraform to stand up a splunk server and a honeypot and just log all the things.

Fred Damstra [io2] f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
bin 7c48f871f6 Initial commit. пре 7 година
.gitignore 7c48f871f6 Initial commit. пре 7 година
AWS_AMI_MAPS.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
Makefile 7c48f871f6 Initial commit. пре 7 година
README.md 7c48f871f6 Initial commit. пре 7 година
banner.txt 7c48f871f6 Initial commit. пре 7 година
honeypot.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
network_acl.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
provider.j 7c48f871f6 Initial commit. пре 7 година
security.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
splunk_server.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
variables.include f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
variables.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
vpcs_and_subnets.j f1e0488e58 Appears to be updated to latest tf and aws provider пре 3 година
z_nextsteps.j 7c48f871f6 Initial commit. пре 7 година

README.md

Splunk HoneyPot

Creates a public AWS instance with a public facing interface that listens on all ports. It logs any incoming data on those ports (using https://github.com/fdamstra/python_multithreaded_socket_logger).

Creates a second AWS instance with Splunk on it to share the data that was ingested.

!!! These should not be considered secure. !!!

A server with open ports is an attractive target to a lot of things. While I've taken precautions to try to minimize the risk, I suggest you keep any personal information off these servers. And while you should never reuse passwords, I suggest it's especially important here.

Design

There are two VPCs. The "untrusted" VPC contains the honeypot itself with two interfaces.

The first interface on the honeypot is a management interface. It has a public IP opened to the IPs specified in your configuration that allows only SSH.

The second interface is open to all IP addresses and protocols, but runs no real services. The only services on this interface are from the daemon.

Lastly, there is second instance for splunk itself. This instance resides in a separate VPC and allows SSH, HTTP, and HTTPS traffic.