🎁 GenAI x Sec Advent #6
🍯 In security, a honeypot is a decoy machine designed to attract attackers, to trap them or to study their behavior.
This year at Defcon, my friend @0x4d31 introduced a clever idea on this concept. He combined a webserver honeypots with LLMs! 😏
Galah is a web server honeypot that dynamically generates HTTP responses based on the pages attackers attempt to access.
Why this is clever? 👇
Traditional honeypots are often easy to detect and to fingerprint. But if you use a LLM to generate unpredictable, context-specific responses, then it is a little bit harder for attackers to identify the trap (except with some obvious cases, but you get the idea 🤓).
Something I like is that it also randomizes the server version.
Of course this is not perfect as you can see in the screenshots below and you can sometimes guess that the answer is from an LLM 🤔
I’m running the server for a few more hours so you can test it yourself—until the limit is reached.
(🚨 Please don’t brute-force the server. Otherwise the other will not be able to play)
🐝 Server address: 170.64.237.245:8080
🍯 Galah Project: https://github.com/0x4D31/galah
#honeypot #cybersecurity #genai #infosec