HTTP Admin Honeypot
Detect unauthorized access attempts targeting HTTP admin panels and dashboards.
About HTTP Admin
HTTP admin panels are web-based management interfaces for routers, application servers, databases, and monitoring tools. These panels often use HTTP Basic Authentication and are prime targets for attackers seeking to gain administrative control over infrastructure components.
What Gets Captured
When an attacker attempts to connect using your HTTP Admin honeypot credentials, Tripwires captures:
- Username - The username from the HTTP Basic Authentication header
- Source IP - The attacker's IP address
- Timestamp - Exact time of the request
- User-Agent - The browser or tool used to connect
Connection Formats
HTTP Admin credentials can be planted in various formats depending on your tech stack:
Browser URL
http://user:password@http-xxx.gettripwires.com:8080/admin
curl with Basic Auth
curl -u user:password http://http-xxx.gettripwires.com:8080/admin
Python (requests)
import requests
response = requests.get(
'http://http-xxx.gettripwires.com:8080/admin',
auth=('user', 'password')
)
wget
wget --user=user --password=password http://http-xxx.gettripwires.com:8080/admin
Strategic Placement Ideas
Router/Switch Management
Leave as 'network device admin panel' URL in network documentation.
Monitoring Dashboards
Add as 'Grafana/Prometheus admin' credentials in monitoring setup docs.
Internal Bookmarks
Include as 'Jenkins/Tomcat Manager' in shared browser bookmark files.