Artillery 0.5.1 Alpha released


Artillery: Powefull Linux Protection tool
Artillery is a combination of a honeypot, file monitoring and integrity, alerting, and brute force prevention tool. It is light weight, has multiple different methods for detecting specific attacks and eventually will also notify you of insecure nix configurations. Artillery is coded in python.



“Artillery is a combination of a honeypot, monitoring tool, and alerting system. Eventually this will evolve into a hardening monitoring platform as well to detect insecure configurations from nix systems.”

Official change log for Artillery 0.4 Alpha:
added the ability to specify a NIC interface (thanks Niel)
fixed a bug when banlist.txt was not found, artillery would crash

Artillery 0.5 Alpha was also released in the past. 
This is its change log:
added OSX support for setup.py installation (thanks for the help Giulio Bortot)
Download Artillery:
Artillery 0.5.1 Alpha can be downloaded from the SVN at the following link:
svn co http://svn.secmaniac.com/artillery artillery/

How to install Artillery
./install.py

This will add artillery to bootup and start Artillery. To give a run down of some of the features.

How to check Artillery is running

netstat -antp | grep LISTEN

tcp 0 0 0.0.0.0:135 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:5800 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:3306 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:5900 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:110 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:10000 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:8080 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:53 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:21 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:22 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:25 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:1433 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:1337 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:44443 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:1723 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:3389 0.0.0.0:LISTEN 29310/python
tcp 0 0 0.0.0.0:445 0.0.0.0:LISTEN 29310/python

How does Artillery works

As per above example If anyone decides to port scan or touch those ports, they are blacklisted immediately and permanently. It’s multi-threaded and can handle as many connections thrown at it. Author did some testing on his own site. And results where amazing. In the first 3 days, it blocked over 387 individuals.

In addition to the monitoring, it will also monitor file integrity leveraging sha-512 database where it keeps track of all system files and if anything changes, will email you with the change. By default it monitors /etc/ and /var/www. Artillery also monitors the SSH logs, and the event of abrute force attack, blacklists the host forever.

By default artillery installs in /var/artillery and the config file is located at /var/artillery/config

Visit Website -