STINGAR Documentation
STINGAR helps organizations protect their computer networks from malicious attacks by providing a convenient way to deploy and manage honeypots. For general information, please see the STINGAR website.
STINGAR provides a way for you to:
- Identify linux servers that will host your honeypots.
- Configure & deploy honeypots to these linux servers.
- Manage your honeypots.
- View all attack events and filter them using various criteria.
The user interface is divided into five sections:
- Manage Hosts - Identify and configure servers that host your honeypots.
- Manage Honeypots - View a list of your honeypots and manage their availability.
- Deploy Honeypots - Identify, configure & deploy honeypots to specific hosts.
- Attack Analysis - View summary & detailed information about honeypot events.
- Settings - Manage information needed to support the system such as user accounts and deployment tags.
STINGAR installation instructions are available at this site.
If you've installed STINGAR & now want to setup you first host to deploy a honeypot, the Getting Started section is a good place to start.