Setting up filtering code
The easiest and most convenient method for installing a filter on a website is to download a ready-made filtering file. It will be generated for you automatically depending on the selected settings.

The easiest and most convenient method for installing a filter on a website is to download a ready-made filtering file. It will be generated for you automatically depending on the selected settings.
Target and dummy sites can be presented as file, domain or URL.
You can choose your method of work for the target and dummy sites. The service will automatically generate the optimal file for you, depending on the selected method.
The visitor will be redirected to the link you specified. You need to specify the full URL in the site field to make this method working. You can change links on the fly without downloading a new file.
The visitor will be redirected to the link you specified and shown a redirect page. The page displays a message about checking the user's browser. This technique allows you to fool attackers who parse the Location
headers.
The visitor will be redirected to the link you specified using the 301 Moved Permanently
header. It is believed that this way search engines will show your target domain in search results, and not the filter domain. A normal redirect uses the 302 Found
header.
The script will open a file located on the server using the include
PHP method. In the site field, you must specify the name of the file, if it is located in the same folder as the script, or the full path to the file. You can change this name on the fly in campaign settings without downloading a new file.
Do not use standard filenames: target.php
, dummy.php
, black.php
, white.php
, bl.php
, wh.php
, w.php
or b.php
- to prevent an attacker from gaining access to your site with a simple search. If no file name is specified, black-index.php
and white-index.php
are used for the target and dummy sites, respectively.
The visitor will see an iframe inside which your target or dummy site will open. You need to specify the full URL in the site field to make this method working. You can change links on the fly in campaign settings without downloading a new file.
Make sure your site does not contain elements that are blocked when running inside an iframe. For example, requests for location or access to peripheral devices.
The script will make a CURL request for the specified link and show its content to the visitor. You need to specify the full URL in the site field to make this method working. You can change links on the fly in campaign settings without downloading a new file.
The request can be sent using either the GET method or the POST method. Both content display and 301/302 redirection are supported. The request is made to the URL specified in the settings, additional GET and POST parameters are sent to this address.
Make sure that all resources used in the server response (images, scripts, styles, forms) have absolute paths with domain. The script will not parse requests to third-party paths and show the whole site - this feature requires a proxy.
It works like the previous option, but it automatically replaces all the paths of images, styles, scripts and forms through the base href
attribute in the site header. In this case, it is not necessary to use absolute resource paths, relative paths will also work well. Sometimes
You can embed your filter directly into your WordPress site. To install, disable WordPress updates and upload the index.php
file to the server instead of the same WordPress file.
Important! You cannot use WordPress on both the target and the dummy sites at the same time, you'll just have one site open. Use different working methods for the target and dummy sites.
A WordPress site is the perfect way to create a honeypot. From the point of view of an attacker, this is a completely legitimate site, which is also subject to classic hacking techniques. Do not forget to leave realistic contacts and information on the dummy site so that attackers do not try to dig deeper and be satisfied with getting to this resource.