top of page
  • X
  • Facebook
  • Linkedin
  • Instagram
Search

Announcing Jebakan v1.0.0 – A Python-Based Honeypot for Real-World Threat Intelligence



We’re excited to officially launch Jebakan v1.0.0, a purpose-built Python honeypot framework designed to support threat intelligence teams, red teamers, and security researchers in capturing real-world attack data. Whether you’re testing detection capabilities, mapping attacker TTPs, or training defenders—Jebakan gives you a tactical edge.


Why Honeypots Still Matter


Honeypots remain one of the most effective tools for understanding how attackers operate in the wild. By simulating vulnerable services, you can passively collect data on brute-force attempts, command execution, lateral movement, and tool usage—all without risking production systems.


What’s Inside Jebakan v1.0.0


This release delivers a robust, modular honeypot system designed for flexibility and depth. Key features include:


🔧 Multi-Protocol Emulation

Jebakan supports a wide array of services to bait and capture diverse attack types:

  • SSH / Telnet – Credential harvesting and command monitoring

  • HTTP / HTTPS – Web exploitation including SQLi, XSS, and traversal

  • FTP – File manipulation attempts and login brute-force

  • MySQL / MSSQL – Database probing and exploit attempts

  • Redis / Elasticsearch – NoSQL injection and abuse detection

  • Docker API – Container escape and resource misuse

  • RDP / VNC – Remote desktop reconnaissance


🧠 Configurable Interaction Levels


Choose your level of interaction depending on your risk appetite:

  • Low – Simple connection logging

  • Medium – Simulated service responses

  • High – Deep interactive engagement with attacker behavior tracking


📊 Real-Time Analytics


Jebakan provides a tactical dashboard to track activity as it unfolds:

  • Web-based interface with live metrics

  • Custom alerts based on activity thresholds

  • Clean JSON logs for SIEM ingestion

  • Geo-based mapping and attacker behavior visualization


⚙️ Practical Design for Deployment

  • Modular Architecture – Run only what you need

  • Fail-Safes – Protection against resource abuse

  • Simple Configuration – JSON configs and CLI overrides

  • Auto Port Check – Ensures smooth service startup


What’s Free, What’s Coming


The current release is the Community Edition—100% free for research, education, and testing. A Professional Edition is in development, with enterprise-focused features such as:

  • Containerized and sandboxed deployments

  • Distributed honeypot orchestration

  • Active Directory and cloud service emulation

  • Machine learning-based attack classification

  • MITRE ATT&CK attack chain mapping

  • SIEM and threat intel integrations


We’ll also offer commercial support, service development, deployment assistance, and continuous threat signature updates in the Pro tier.


Get Started


Clone it and run in minutes:

git clone https://github.com/username/jebakan.git
cd jebakan
pip install -r requirements.txt
python jebakan.py

 
 
 

Kommentare


© 2025 by Red Cell Security, LLC.

bottom of page