-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
added basic canary webhook implementation #10
base: main
Are you sure you want to change the base?
Conversation
I think we can also add in this to include event type, attacker IP, server IP, and timestamp. Is it a good idea ? otherwise logging will not seem useful ? |
Ohh, I didn't think about it that way. nicee |
no worries, the only issue with this method is that since the dicom server itself triggers the canary token webhook, we cannot get the actual ip of the attacker, instead we get the IP of the server. I tried thinking around it, i.e. injecting the canary token URL into the dicom payload as an unused private tag, however that didn't work. We could possibly setup a virtual directory and setup webhooks to check if triggered, but I believe that's out of scope for this tool. |
I realised normal http triggers for the canary token won't work with DICOM, and embedding tokens in a It uses smtp to send an email with the client/attackers IP, port, etc. |
This PR aims to add canary webhooks support to the DICOMHawk honeypot server.
Steps to reproduce have been added in the
README.md
It utilizes a
.env
file to store the canary url.Planned roadmap:
Please do let me know if any other changes are to be made!