nuclei-templates/network/honeypot/dionaea-smb-honeypot-detect...

30 lines
785 B
YAML
Raw Normal View History

id: dionaea-smb-honeypot-detect
info:
2023-11-08 06:13:53 +00:00
name: Dionaea SMB Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Dionaea SMB honeypot has been identified.
The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
metadata:
2023-11-08 15:12:25 +00:00
max-request: 1
shodan-query: port:445
vendor: dionaea
product: dionaea
2023-11-08 06:13:53 +00:00
tags: dionaea,smb,honeypot,ir,cti,network
tcp:
2023-11-08 15:12:25 +00:00
- inputs:
- data: "00000045ff534d4272000000000801c8000000000000000000000000ffff0100ffff0000002200024e54204c4d20302e31320002534d4220322e3030320002534d4220322e3f3f3f00"
type: hex
2023-11-08 15:12:25 +00:00
host:
- "{{Hostname}}"
port: 445
read-size: 1024
2023-11-08 15:12:25 +00:00
matchers:
- type: binary
binary:
- "6538547e6c42"