You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/GreedyBear/Installation.md
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -78,12 +78,12 @@ In the `env_file`, configure different variables as explained below.
78
78
-`DEFAULT_SLACK_CHANNEL`: ID of the Slack channel you want to post the message to
79
79
80
80
## ElasticSearch compatibility.
81
-
Greedybear leverages a [python client](https://elasticsearch-py.readthedocs.io/en/v8.19.1/) for interacting with ElasticSearch which requires to be at the exact major version of the related T-POT ElasticSearch instance.
81
+
Greedybear leverages a [python client](https://elasticsearch-py.readthedocs.io/en/v9.2.1/) for interacting with ElasticSearch which requires to be at the exact major version of the related T-POT ElasticSearch instance.
82
82
This means that there could problems if those versions do not match.
83
83
84
-
The current version of the client installed is the 8.19.3 which allows to run TPOT version from 22.04.0 to 24.04.1 without any problems (and some later ones...we regularly check T-POT releases but we could miss one or two here.)
84
+
The current version of the client installed is the 9.2.1 which allows to run TPOT version >= 24.04.1 without any problems (we regularly check T-POT releases but we could miss one or two here).
85
85
86
-
If you want to have compatibility with previous versions, you need to change the `elasticsearch8` version [here](https://github.com/intelowlproject/GreedyBear/blob/main/requirements/project-requirements.txt)and [re-build](https://intelowlproject.github.io/docs/GreedyBear/Installation/#rebuilding-the-project-creating-custom-docker-build)locally the project.
86
+
If you want to have compatibility with previous versions, you need to change `elasticsearch` to `elasticsearch8`with an appropriate version [here](https://github.com/intelowlproject/GreedyBear/blob/main/requirements/project-requirements.txt), adjust the imports [here](https://github.com/intelowlproject/GreedyBear/blob/main/greedybear/cronjobs/repositories/elastic.py)and [here](https://github.com/intelowlproject/GreedyBear/blob/main/greedybear/settings.py), and [re-build](https://intelowlproject.github.io/docs/GreedyBear/Installation/#rebuilding-the-project-creating-custom-docker-build) the project locally.
Copy file name to clipboardExpand all lines: docs/GreedyBear/Introduction.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -8,7 +8,7 @@ The project goal is to extract data of the attacks detected by a [TPOT](https://
8
8
9
9
## Public feeds
10
10
11
-
There are public feeds provided by The Honeynet Project in this site: greedybear.honeynet.org. [Example](https://greedybear.honeynet.org/api/feeds/log4j/all/recent.txt)
11
+
There are public feeds provided by The Honeynet Project in this site: greedybear.honeynet.org. [Example](https://greedybear.honeynet.org/api/feeds/cowrie/all/recent.txt)
12
12
13
13
To check all the available feeds, Please refer to our [usage guide](https://intelowlproject.github.io/docs/GreedyBear/Usage/)
-`cowrie`: attacks detected from the Cowrie Honeypot.
15
+
-`<honeypot_name>`: attacks detected from a specific type of honeypot; for example `cowrie`
17
16
-`all`: get all types at once
18
-
- The following honeypot feeds exist (for extraction of (only) the source IPs):
19
-
-`heralding`
20
-
-`ciscoasa`
21
-
-`honeytrap`
22
-
-`dionaea`
23
-
-`conpot`
24
-
-`adbhoney`
25
-
-`tanner`
26
-
-`citrixhoneypot`
27
-
-`mailoney`
28
-
-`ipphoney`
29
-
-`elasticpot`
30
-
-`dicompot`
31
-
-`redishoneypot`
32
-
-`sentrypeer`
33
-
-`glutton`
34
17
35
18
The available attack_type are:
36
19
37
20
-`scanner`: IP addresses captured by the honeypots while performing attacks
38
-
-`payload_request`: IP addresses and domains extracted from payloads that would have been executed after a speficic attack would have been successful
21
+
-`payload_request`: IP addresses and domains extracted from payloads that would have been executed after a speficic attack would have been successful. This will currently only return requests recorded by the Cowrie honeypot.
39
22
-`all`: get all types at once
40
23
41
24
The available prioritization mechanisms are:
@@ -66,6 +49,7 @@ These predictions are based on historical interaction patterns and are updated o
66
49
Check the [API specification](https://intelowlproject.github.io/docs/GreedyBear/Api-docs/#docs.Submodules.GreedyBear.api.views.feeds.feeds_advanced) or the to get all the details about how to use the available APIs.
67
50
68
51
## Advanced Feeds API
52
+
_Available from version >= 1.4.0_
69
53
70
54
For authenticated users, GreedyBear offers an additional API endpoint that provides similar functionality to the Feeds API but with enhanced customization options.
71
55
```
@@ -142,6 +126,7 @@ If you would like to leverage this API without the need of writing even a line o
142
126
143
127
144
128
## Cowrie Session API
129
+
_Available from version >= 2.1.0_
145
130
146
131
For authenticated users, GreedyBear offers an API to retrieve session data from the [Cowrie](https://github.com/cowrie/cowrie) honeypot including command sequences, credentials, and session details. Queries can be performed using either an IP address to find all sessions from that source, or a SHA-256 hash to find sessions containing a specific command sequence.
0 commit comments