Glastopf Project

updated by Lukas Rist on December 11. 2012

Glastopf is a Honeypot which emulates thousands of vulnerabilities to gather data from attacks targeting web applications. The principle behind it is very simple: Reply the correct response to the attacker exploiting the web application. The project has been kicked off by Lukas Rist in 2009 and the results we are got during this time are very promising and are an incentive to put even more effort in the development of this unique tool. Read the tool description for further information.
We are working together with different people, organizations and institutions to get the best from the collected data. Find out more about collaborating with the project.
Documents
Know Your Tool: Glastopf
CFT Final Report
Media Coverage
darkREADING: New Honeypot Mimics The Web Vulnerabilities Attackers Want
SECURITYWEEK: HoneyNet Project Releases SQL Injection Emulator
PCWorld: Glastopf Web application honeypot gets SQL injection emulation capability
Current Project
At the moment we are working on the dynamic dork list and the SQL injection handler for Glaspot v3
Future Plans
We are looking forward to have a web threat analysis platform in the next months. Including a sandbox and botnet monitoring
Contact
See the team page
Miscellaneous
QR code for this page
Legal Notice