DICOMHawk: A DICOM honeypot for detecting and logging unauthorized access attempts
DICOMHawk
DICOMHawk is a powerful and efficient honeypot for DICOM servers, designed to attract and log unauthorized access attempts and interactions. Built using Flask and pynetdicom, DICOMHawk offers a streamlined web interface for monitoring and managing DICOM interactions in real-time.
Feature
- DICOM Server Simulation: Supports C-ECHO, C-FIND, and C-STORE operations to simulate a realistic DICOM server environment.
- Logging: Detailed logging of DICOM associations, DIMSE messages, and event-specific data to track and analyze potential attacks.
- Web Interface: A user-friendly web interface to view server status, active associations, and logs.
- Custom Handlers: Easily extendable to support additional DICOM services and custom logging or handling requirements.
Getting Started
Â
Prerequisites
Â
- Docker and Docker Compose installed on your machine
- DCMTK tools installed on your local machine for testing
Installation
Â
Clone the repository:
git clone https://github.com/gtheodoridis/DICOMHawk.git
cd dicomhawkStart the services with Docker Compose:
docker-compose up -d
This command starts the Flask application and a log server in detached mode. The web interface is accessible on port 5000, and the DICOM server listens on port 11112. Alternatively, port 104 is also applicable for DICOM (ACR-NEMA).
Usage
Â
Access the Web Interface:
Open a web browser and go toÂ
http://127.0.0.1:5000
 to access the DICOMHawk web interface. Here, you can monitor server status, view active associations, and check the logs.Test the DICOM Server:
Use DCMTK tools to interact with the DICOM server.
C-ECHO (DICOM Echo Test):
echoscu 127.0.0.1 11112
C-FIND (DICOM Find Test):
Create a query file,Â
query.dcm
, with the following content:Run the C-FIND command:
findscu -v -S -k QueryRetrieveLevel=STUDY -k PatientName=Baggins^Frodo 127.0.0.1 11112
C-STORE (DICOM Store Test):
To send a DICOM file to the server, use theÂ
storescu
 command:storescu 127.0.0.1 11112 path/to/your/file.dcm
Development
Â
If you want to make changes to DICOMHawk or extend its functionality, modify the source code, then restart the services:
docker-compose down
docker-compose up -d
Logs and Monitoring
Â
DICOMHawk provides detailed logging to help you monitor and analyze interactions with the DICOM server:
- Server Logs: Access logs to see detailed information about DICOM associations and DIMSE messages.
- Simplified Logs: View simplified logs for a quick overview of events.
You can view these logs through the web interface or by accessing the log files directly within the log server container.
docker-compose logs logserver
Source: https://github.com/gtheodoridis/