this post was submitted on 05 Sep 2023
52 points (91.9% liked)

Selfhosted

39250 readers
402 users here now

A place to share alternatives to popular online services that can be self-hosted without giving up privacy or locking you into a service you don't control.

Rules:

  1. Be civil: we're here to support and learn from one another. Insults won't be tolerated. Flame wars are frowned upon.

  2. No spam posting.

  3. Posts have to be centered around self-hosting. There are other communities for discussing hardware or home computing. If it's not obvious why your post topic revolves around selfhosting, please include details to make it clear.

  4. Don't duplicate the full text of your blog or github here. Just post the link for folks to click.

  5. Submission headline should match the article title (don’t cherry-pick information from the title to fit your agenda).

  6. No trolling.

Resources:

Any issues on the community? Report it using the report flag.

Questions? DM the mods!

founded 1 year ago
MODERATORS
 

but before I do, I figured I'd ask if anyone's aware of any tools/software that covers my basic needs of setting something basic that may alert me if there are any intruders in the network?

Needs:

  1. Fake ssh login that can trigger a script so I can take care of the rest.
  2. Fake network share (cifs/samba) that can trigger a script if anything tries to access it.

Would be great if there are any docker images I can just pull, make some minor edits, and run.

Thanks!

you are viewing a single comment's thread
view the rest of the comments
[–] notexecutive@sh.itjust.works 22 points 1 year ago (5 children)
[–] KLISHDFSDF@lemmy.ml 26 points 1 year ago (1 children)

I plan on making it available inside my own network, not public. This way if someone makes it past my security, I at least have something that might "catch" them in the act and disable my network so I can intervene. Just another security layer.

[–] chandz05@lemmy.world 3 points 1 year ago

I have never thought about doing this... But this is actually such a good idea. I'm probably going to set this up myself

[–] lilShalom@lemmy.basedcount.com 19 points 1 year ago (1 children)

If you place this on the inside of your network and it triggers, youre either compromised or a scanner/ person triggered it.

[–] finestnothing@lemmy.world 1 points 1 year ago

That's the idea I think

[–] recursive_recursion@programming.dev 15 points 1 year ago* (last edited 1 year ago)

one of the best ways to protect your friends is to leave juicy bait that only zero-sum people would try to steal

plus wasting malicious user's time also provides multiple benefits such as reducing the prevalence of spam and DDoS attacks

Do you not feel the itch of curiosity?

[–] Smk@lemmy.ca 3 points 1 year ago

FOR SCIENCE!1!!