蜜罐
蜜罐,顾名思义,就装蜜糖的罐子。因为糖、蜜等气味独特,对鼠虫吸引力较大,在网络中表示构造一个假环境来迷惑入侵者。
安装
按照官网教程安装

脚本会自动下载软件包并配置

配置
打开网址ip:4433/web/

输入默认账号和密码,进入数据库选择界面

选择sqlite3就直接完成,如果选择MySQL/Mariadb就需要配置数据库信息

配置完成

演示
登录后,会显示汇总信息

nginx代理
按照官网配置就可以了
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43
| server{ # SSL configuration # listen 443 ssl; listen [::]:443 ssl;
server_name jackeylea.com;
index index.html index.htm index.php default.html default.htm default.php;
# 修改这里,SSL 证书文件路径,由证书签发机构提供 ssl_certificate /etc/letsencrypt/live/jackeylea.com/fullchain.pem; # 修改这里,SSL 密钥文件路径,由证书签发机构提供 ssl_certificate_key /etc/letsencrypt/live/jackeylea.com/privkey.pem; # 修改这里,CA 根证书文件路径,由证书签发机构提供 # ssl_trusted_certificate cert/chain.pem;
#日志部分 access_log off; error_log off;
location / { proxy_set_header HOST $host; proxy_set_header X-Forwarded-Proto $scheme; proxy_set_header X-Real-IP $remote_addr; proxy_set_header REMOTE-HOST $remote_addr; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; proxy_set_header X-Forwarded-Host $host; proxy_set_header X-Forwarded-Port $server_port;
fastcgi_param SERVER_NAME $server_name; fastcgi_param SERVER_PORT $server_port; fastcgi_param SERVER_PROTOCOL $server_protocol; fastcgi_param PATH_INFO $fastcgi_path_info; fastcgi_param REQUEST_METHOD $request_method; fastcgi_param QUERY_STRING $query_string; fastcgi_param CONTENT_TYPE $content_type; fastcgi_param CONTENT_LENGTH $content_length;
#proxy_pass_header Authorization; proxy_pass https://127.0.0.1:4433$request_uri; } }
|
然后访问后台就是https://jackeylea.com/web
说明
- 如果hfish配置了mysql伪装,那么hfish就会占用3306端口,这样入侵者试图通过3306访问mysql时就会被记录下来,并且怎么访问都不会成功
- 那么真的mysql就得重新配置端口了