Preparation
Pick the target network segment (office LAN, server VLAN, OT) and the decoy persona (backup server, secondary controller, NAS).
Enterprise honeypot · MTTD < 30 s · lateral-movement detection
The silent tripwire that fires when the attacker thinks they're invisible. SYLink Hornetbot is a self-hosted enterprise decoy deployed within minutes inside your LAN or server VLAN: it impersonates a legitimate Windows server (SMB shares, RDP, SSH, fake business apps) and alerts on the first scan, the first authentication attempt, the first write to a trapped share. No user has any legitimate reason to touch it — every interaction is a qualified attack signal.
The silent tripwire that fires when the attacker thinks they're invisible. SYLink Hornetbot is a self-hosted enterprise decoy deployed within minutes inside your LAN or server VLAN: it impersonates a legitimate Windows server (SMB shares, RDP, SSH, fake business apps) and alerts on the first scan, the first authentication attempt, the first write to a trapped share. No user has any legitimate reason to touch it — every interaction is a qualified attack signal.
SYLink Hornetbot — Enterprise honeypot · MTTD < 30 s · lateral-movement detection.
Le Hornetbot expose un éventail crédible de services réseau d'entreprise : un faux serveur de sauvegarde, des partages SMB sensibles (comptabilité, RH, sauvegardes), un accès RDP exposé, des bases de données apparemment mal sécurisées. Côté attaquant, c'est un poste de travail qu'on adore trouver — sous-sécurisé, riche en données, isolé. Côté défense, c'est un piège : aucun utilisateur n'y a accès, aucun process métier n'y écrit, aucune appli ne s'y connecte.
Toute interaction est qualifiée à la source : une simple sonde TCP devient un signal "reconnaissance", une tentative d'authentification SSH devient "credential spraying", la lecture du partage Comptabilité$ devient "exfiltration de stade 2". Le moteur SYLink corrèle l'événement avec le contexte (heure, IP source, vélocité), enrichit avec la CTI souveraine et déclenche l'alerte vers UniSOC ou votre SIEM en moins de 30 secondes.
L'attaquant ne sait pas qu'il est observé. Pendant qu'il déroule sa kill-chain sur ce qu'il croit être un serveur réel, vos analystes ont déjà identifié son IP source, listé ses outils et démarré le confinement.
VM leurre déployée dans votre LAN ou VLAN serveurs : elle imite un serveur d'entreprise (partages SMB, RDP, SSH, applicatifs factices) et alerte au premier scan ou à la première tentative d'authentification. Aucune fonction métier — toute interaction est qualifiée.
Typical deployment: import the signed VM into your hypervisor, assign an IP consistent with the target segment, choose a plausible hostname, plug syslog output into your SIEM or UniSOC. First alert tested via a controlled internal scan.
Pick the target network segment (office LAN, server VLAN, OT) and the decoy persona (backup server, secondary controller, NAS).
qcow2.zst into Proxmox / KVM or OVA into VMware. GPG signature verified at import.
Hostname, static IP, fake shares, banners aligned with your internal naming.
Signed syslog / webhook output to UniSOC SYLink or your SIEM. Alert test via controlled internal scan.
Signed image updates pushed via the SYLink channel (or manual import for air-gap). Quarterly review of the decoy persona.
Pick the target network segment (office LAN, server VLAN, OT) and the decoy persona (backup server, secondary controller, NAS).
qcow2.zst into Proxmox / KVM or OVA into VMware. GPG signature verified at import.
Hostname, static IP, fake shares, banners aligned with your internal naming.
Signed syslog / webhook output to UniSOC SYLink or your SIEM. Alert test via controlled internal scan.
Signed image updates pushed via the SYLink channel (or manual import for air-gap). Quarterly review of the decoy persona.
↓ Integration pipeline — step by step, from scoping to production ↓
Where an EDR detects ongoing behavior on an already-compromised endpoint, the Hornetbot reveals the attacker the moment they scan or enumerate the network — often before the first malicious execution.
No legitimate user has any reason to touch this server. Every interaction is an attack signal, qualified at source.
Signed Debian 13 VM image. No outbound telemetry, no third-party cloud, no callbacks outside your perimeter. Air-gap-compatible for sensitive networks.
Covers incident-detection requirements (NIS2 art. 21), notification (art. 23), DORA operational resilience and GDPR minimization — no personal data collected.
| Image | VM Debian 13 minimale · signée GPG |
| Formats | qcow2.zst (Proxmox / KVM) · OVA (VMware / Workstation) |
| Footprint | ≈ 250–280 Mo · 1 vCPU · 1 Go RAM · 4 Go disque |
| Go-live | Import VM → IP statique → premier signal en < 5 min |
| Update | Image signée poussée par canal SYLink ou import manuel air-gap |
| SSH (port 22) | Bannière serveur Linux crédible · capture creds + commandes saisies |
| HTTP (port 80) | Page "BackupServer" thématisée · formulaire login factice |
| SMB (port 445) | Partages factices (ex. Comptabilité$, RH$, Sauvegardes$) · capture des accès |
| RDP (port 3389) | Bannière Windows Server · détection brute-force et énumération |
| Bases de données | Stubs Postgres · Redis · MongoDB · Elasticsearch (réponses minimales, log complet) |
| SNMP (port 161) | Réponses System / Interface crédibles pour piéger les outils de découverte |
| Tarpit TCP | Ralentit volontairement les scans massifs pour grappiller du temps de détection |
| OS fingerprint | TTL 128 · stack TCP/IP simulant Windows Server 2019 |
| Banners | Versions et noms d'hôte cohérents avec votre nomenclature interne (configurable) |
| Hostname / domain | Personnalisable pour s'intégrer dans votre AD (ex. SRV-BKP-03.intra) |
| Behavior | Aucune réponse aux scans "trop curieux" qui pourraient révéler la nature leurre |
| Event output | Syslog · JSON HTTP · webhook signé · e-mail |
| Native connectors | UniSOC SYLink · SIEM Splunk / Elastic / QRadar / Sentinel |
| Alert levels | Info (scan) · Suspect (auth tentée) · Critique (creds capturés / fichier déposé) |
| Local retention | 30 jours de logs sur la VM · export continu vers SIEM |
| Event signing | HMAC pour intégrité forensique |
A town of around 80,000 inhabitants deploys 3 Hornetbots (city hall, library, technical services). A library endpoint is compromised by an office-suite malware: 18 minutes after infection the local Hornetbot captures an SMB enumeration attempt from that endpoint — the attack is contained before reaching the central SI.
A 120-person firm deploys a Hornetbot with a "backup server" persona (RDP only exposed internally). Mid-day, RDP attempts arrive from a user endpoint — the user has no reason to touch it. Compromised AD account isolated within the hour.
Hornetbot with a "secondary PACS" persona deployed on the medical-imaging VLAN. Any interaction is abnormal by construction — qualified alert immediately on lateral propagation from the office VLAN.
Hornetbot positioned at the IT/OT boundary, exposing a fake PLC and a "Schemas$" share. Detects OT mapping tools (Modbus / SNMP enumeration) before they reach the real systems.
3 to 5 Hornetbots deployed in sensitive zones (HQ LAN, AD, backups, finance). All feed UniSOC, correlated with the SYLink CTI — unified view of "who's poking around where" in the SI.
"Client folder server" persona exposed via SMB. Any enumeration of the share triggers a critical alert — a compromised AD session is caught before sensitive data is exfiltrated.
30-minute guided demo, PoC on a pilot perimeter, support by our French teams based in Clermont-Ferrand, Marseille and Rennes.