nuclei-templates/network/honeypot/redis-honeypot-detect.yaml

32 lines
887 B
YAML
Raw Normal View History

id: redis-honeypot-detect
info:
2023-11-08 06:13:53 +00:00
name: Redis Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Redis honeypot has been identified.
The response to the 'QUIT' command differs from real installations, signaling a possible deceptive setup.
classification:
cpe: cpe:2.3:a:redis:redis:*:*:*:*:*:*:*:*
metadata:
max-request: 1
product: redis
2023-11-08 15:12:25 +00:00
shodan-query: redis
vendor: redis
tags: redis,honeypot,ir,cti,network
tcp:
2023-11-08 15:12:25 +00:00
- inputs:
- data: "QUIT"
2023-11-08 15:12:25 +00:00
host:
- "{{Hostname}}"
port: 6379
read-size: 1024
2023-11-08 15:12:25 +00:00
matchers:
- type: word
words:
- "-ERR unknown command `QUIT`, with args beginning with:"
# digest: 4a0a004730450221009e2481230ea77b890f4f90e813a7819e7583659e656adad9f1a2dceab33ac86002205d350a2b3dcc3e166f3e1fc2cdc7992eba01c574dbda36351ddd02d7b7446826:922c64590222798bb761d5b6d8e72950