# Honeypot Below is a complete overview of the Krawl honeypot's capabilities ## robots.txt The actual (juicy) robots.txt configuration [is the following](../src/templates/html/robots.txt). ## Honeypot pages ### Common Login Attempts Requests to common admin endpoints (`/admin/`, `/wp-admin/`, `/phpMyAdmin/`) return a fake login page. Any login attempt triggers a 1-second delay to simulate real processing and is fully logged in the dashboard (credentials, IP, headers, timing). ![admin page](../img/admin-page.png) ### Common Misconfiguration Paths Requests to paths like `/backup/`, `/config/`, `/database/`, `/private/`, or `/uploads/` return a fake directory listing populated with "interesting" files, each assigned a random file size to look realistic. ![directory-page](../img/directory-page.png) ### Environment File Leakage The `.env` endpoint exposes fake database connection strings, **AWS API keys**, and **Stripe secrets**. It intentionally returns an error due to the `Content-Type` being `application/json` instead of plain text, mimicking a "juicy" misconfiguration that crawlers and scanners often flag as information leakage. ### Server Error Information The `/server` page displays randomly generated fake error information for each known server. ![server and env page](../img/server-and-env-page.png) ### API Endpoints with Sensitive Data The pages `/api/v1/users` and `/api/v2/secrets` show fake users and random secrets in JSON format ![users and secrets](../img/users-and-secrets.png) ### Exposed Credential Files The pages `/credentials.txt` and `/passwords.txt` show fake users and random secrets ![credentials and passwords](../img/credentials-and-passwords.png) ### SQL Injection and XSS Detection Pages such as `/users`, `/search`, `/contact`, `/info`, `/input`, and `/feedback`, along with APIs like `/api/sql` and `/api/database`, are designed to lure attackers into performing attacks such as **SQL injection** or **XSS**. ![sql injection](../img/sql_injection.png) Automated tools like **SQLMap** will receive a different randomized database error on each request, increasing scan noise and confusing the attacker. All detected attacks are logged and displayed in the dashboard. ### Path Traversal Detection Krawl detects and responds to **path traversal** attempts targeting common system files like `/etc/passwd`, `/etc/shadow`, or Windows system paths. When an attacker tries to access sensitive files using patterns like `../../../etc/passwd` or encoded variants (`%2e%2e/`, `%252e`), Krawl returns convincing fake file contents with realistic system users, UIDs, GIDs, and shell configurations. This wastes attacker time while logging the full attack pattern. ### XXE (XML External Entity) Injection The `/api/xml` and `/api/parser` endpoints accept XML input and are designed to detect **XXE injection** attempts. When attackers try to exploit external entity declarations (`