Artillery v0.4 Alpha Released
Artillery is a honeypot/monitoring/prevention tool used to protect Linux-based systems. Artillery will setup multiple ports on the nix system and if anything touches it will automatically blacklist them. In addition, it monitors the filesystem for changes and emails the changes back to you. It also detects SSH brute force attacks and automatically blocks them as well.
This was a combination of user submitted enhancements, fixes, and others as well as new feature additions. I’ve added the ability to use any SMTP address versus just being able to do GMAIL. In addition, the banning messages are a bit more description on why a specific IP address was banned.
Changelog v0.4 alpha
- added ability to use cidr notations in the artillery config so you can do something like 127.0.0.1,localhost,192.168.235.1/24,etc.
- code cleanup and commenting on multiple directories
- added a number of new core modules, most specifically cidr notation support
- changed install.py to be setup.py
- moved root README to readme/ and deleted the old one
- added better detection around restart_server.py if artillery was there
- cleaned up some old threading syntax issues
Download Artillery v0.4 Alpha