Usage

User management

Registration

Since Greedybear v1.1.0 we added a Registration Page that can be used to manage Registration requests when providing GreedyBear as a Service.

After an user registration, an email is sent to the user to verify their email address. If necessary, there are buttons on the login page to resend the verification email and to reset the password.

Once the user has verified their email, they would be manually vetted before being allowed to use the GreedyBear platform. The registration requests would be handled in the Django Admin page by admins. If you have GreedyBear deployed on an AWS instance you can use the SES service.

In a development environment the emails that would be sent are written to the standard output.

Recaptcha configuration

The Registration Page contains a Recaptcha form from Google. By default, that Recaptcha is not configured and is not shown. If your intention is to publish GreedyBear as a Service you should configure the Recaptcha.

Amazon SES

If you like, you could use Amazon SES for sending automated emails.

First, you need to configure the environment variable AWS_SES to True to enable it. Then you have to add some credentials for AWS: if you have GreedyBear deployed on the AWS infrastructure, you can use IAM credentials: to allow that just set AWS_IAM_ACCESS to True. If that is not the case, you have to set both AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY.

Additionally, if you are not using the default AWS region of us-east-1, you need to specify your AWS_REGION. You can customize the AWS Region location of you services by changing the environment variable AWS_REGION. Default is eu-central-1.

Feeds

GreedyBear is created with the aim to collect the information from the TPOTs and generate some actionable feeds, so that they can be easily accessible and act as valuable information to prevent and detect attacks.

The feeds are reachable through the following URL:

https://<greedybear_site>/api/feeds/<feed_type>/<attack_type>/<age>.<format>

The available feed_type are:

  • log4j: attacks detected from the Log4pot.

  • cowrie: attacks detected from the Cowrie Honeypot.

  • all: get all types at once

  • The following honeypot feeds exist (for extraction of (only) the source IPs):

    • heralding

    • ciscoasa

    • honeytrap

    • dionaea

    • conpot

    • adbhoney

    • tanner

    • citrixhoneypot

    • mailoney

    • ipphoney

    • ddospot

    • elasticpot

    • dicompot

    • redishoneypot

    • sentrypeer

    • glutton

The available attack_type are:

  • scanner: IP addresses captured by the honeypots while performing attacks

  • payload_request: IP addresses and domains extracted from payloads that would have been executed after a speficic attack would have been successful

  • all: get all types at once

The available age are:

  • recent: most recent IOCs seen in the last 3 days

  • persistent: these IOCs are the ones that were seen regularly by the honeypots. This feeds will start empty once no prior data was collected and will become bigger over time.

The available formats are:

  • txt: plain text (just one line for each IOC)

  • csv: CSV-like file (just one line for each IOC)

  • json: JSON file with additional information regarding the IOCs

Check the Redoc specification or the to get all the details about how to use the available APIs.

Enrichment

GreedyBear provides an easy-to-query API to get the information available in GB regarding the queried observable (domain or IP address).

https://<greedybear_site>/api/enrichment?query=<observable>

This “Enrichment” API is protected through authentication. Please reach out Matteo Lodi or another member of The Honeynet Project if you are interested in gain access to this API.

If you would like to leverage this API without the need of writing even a line of code and together with a lot of other awesome tools, consider using IntelOwl.