nuclei-templates/network/honeypot/redis-honeypot-detect.yaml

33 lines
918 B
YAML
Raw Permalink Normal View History

id: redis-honeypot-detect
info:
2023-11-08 06:13:53 +00:00
name: Redis Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Redis honeypot has been identified.
The response to the 'QUIT' command differs from real installations, signaling a possible deceptive setup.
classification:
cpe: cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
metadata:
max-request: 1
vendor: redis
product: redis
shodan-query:
- redis
- redis_version
tags: redis,honeypot,ir,cti,network,tcp
tcp:
2023-11-08 15:12:25 +00:00
- inputs:
- data: "QUIT"
2023-11-08 15:12:25 +00:00
host:
- "{{Hostname}}"
port: 6379
read-size: 1024
2023-11-08 15:12:25 +00:00
matchers:
- type: word
words:
- "-ERR unknown command `QUIT`, with args beginning with:"
# digest: 490a0046304402205ef5f150985b83faeac52ecefea699bc896850872f41ed83671e38ae11b0c41a022068024467a49e96b56d62fde1ac18a5f71b866446966b914bf1f7d92933b494d5:922c64590222798bb761d5b6d8e72950