nuclei-templates/network/honeypot/dionaea-smb-honeypot-detect...

31 lines
979 B
YAML
Raw Normal View History

id: dionaea-smb-honeypot-detect
info:
2023-11-08 06:13:53 +00:00
name: Dionaea SMB Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Dionaea SMB honeypot has been identified.
The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
metadata:
2023-11-08 15:12:25 +00:00
max-request: 1
shodan-query: port:445
vendor: dionaea
product: dionaea
2023-11-08 06:13:53 +00:00
tags: dionaea,smb,honeypot,ir,cti,network
tcp:
2023-11-08 15:12:25 +00:00
- inputs:
- data: "00000045ff534d4272000000000801c8000000000000000000000000ffff0100ffff0000002200024e54204c4d20302e31320002534d4220322e3030320002534d4220322e3f3f3f00"
type: hex
2023-11-08 15:12:25 +00:00
host:
- "{{Hostname}}"
port: 445
read-size: 1024
2023-11-08 15:12:25 +00:00
matchers:
- type: binary
binary:
- "6538547e6c42"
# digest: 4a0a00473045022100e676a0de719c4c450a0970ec59a91edd0b34e2e9b032e7c9479f94c3094694d702206b12ba3ec71bb42eb89d1b4fb11187558f8003a4ae48e3a8361bc139006b0594:922c64590222798bb761d5b6d8e72950