Skip to content

tliston/batman

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Batman

A while back, I wrote a fascinating tool that allows a very low-powered device to act as a honeypot on steroids. It listens and responds on every TCP and UDP port, listens for every IP protocol, and logs EVERYTHING. While it's lots of fun and provides an unprecedented view of the amount and types of Internet attacks, it also has allowed me to see a whole bunch of the weirdness that's out there on the 'net.

One day, while I was watching attack traffic streaming by, I happened to notice something odd:

a network attack, containing only the phrase, 'batman'

Interestingly, I've seen this same traffic, over and over, targeting various ports, but always containing just the phrase, 'batman.'

But obviously, there's a problem with the code of the tool that is creating this traffic.

This script, batman.py, is my attempt to fix that. (I'm such a kind and generous person.)

If you want to use it, you obviously need to update the target and port variables. In their current incarnation, they allow you to test the code locally.

Speaking of testing it locally, here's a way to do that:

socat - TCP-LISTEN:5552,fork,reuseaddr

There... I fixed it.

If you don't want to go to the trouble of actually getting this running, you could just download the .pcap file and take a look.

About

Some code I wrote to fix a tool associated with an Internet oddity,

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages