nuclei-templates/network/honeypot/adbhoney-honeypot-shell-det...

37 lines
1.6 KiB
YAML
Raw Normal View History

id: adbhoney-honeypot-shell-detect
info:
2023-11-08 06:13:53 +00:00
name: ADBHoney Honeypot (shell probe) - Detect
author: UnaPibaGeek
severity: info
description: |
ADBHoney honeypot has been identified.
The response to the 'adb shell pwd' command differs from real installations, signaling a possible deceptive setup.
metadata:
max-request: 1
product: adb
2023-11-08 09:07:01 +00:00
shodan-query: product:Android Debug Bridge (ADB) && SM-G960F
vendor: android
verified: true
2023-11-08 06:13:53 +00:00
tags: adbhoney,android,adb,honeypot,ir,cti,network
tcp:
2023-11-08 15:12:25 +00:00
- inputs:
- data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN
type: hex
- data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO
type: hex
- data: "4f50454e6b000000000000000a0000009d030000b0afbab1" # OPEN
type: hex
- data: "7368656c6c3a70776400" # SHELL: PWD
type: hex
2023-11-08 15:12:25 +00:00
host:
- "{{Hostname}}"
port: 5555
read-size: 1024
2023-11-08 15:12:25 +00:00
matchers:
- type: binary
binary:
- "57525445020000006b0000000000000000000000a8adabba"
# digest: 490a0046304402207573d13133329845aa0678ec2422635e9eb8d4d432f0d2de401d77965a89c94402204d47c540aea373241e1ddd4e3d75fc350b46466b776192b986d5c054b0f70313:922c64590222798bb761d5b6d8e72950