commit
0dc7800c40
|
@ -0,0 +1,38 @@
|
||||||
|
id: citrix-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Citrix Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Citrix honeypot has been identified.
|
||||||
|
The HTTP response reveals a possible setup of the Citrix web application honeypot.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
verified: true
|
||||||
|
shodan-query: http.title:“Citrix Login”
|
||||||
|
vendor: citrix
|
||||||
|
product: citrix
|
||||||
|
tags: citrix,honeypot,ir,cti
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}"
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: dsl
|
||||||
|
dsl:
|
||||||
|
- 'len(body)<2000'
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- "<title>Citrix Login</title>"
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- "In order to use our services, you must agree to Citrix's Terms of Service."
|
||||||
|
negative: true
|
|
@ -0,0 +1,37 @@
|
||||||
|
id: dionaea-http-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Dionaea HTTP Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
Dionaea HTTP honeypot has been identified.
|
||||||
|
The response to an incorrect HTTP method reveals a possible setup of the Dioanea web application honeypot.
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
vendor: dionaea
|
||||||
|
product: http
|
||||||
|
tags: dionaea,honeypot,ir,cti
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
AAAA / HTTP/1.1
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
unsafe: true
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: status
|
||||||
|
status:
|
||||||
|
- 501
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- "nginx"
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- '<?xml version="1.0" encoding="ascii"?>'
|
|
@ -0,0 +1,26 @@
|
||||||
|
id: elasticpot-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: ElasticPot Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A ElasticPot (ElasticSearch) honeypot has been identified.
|
||||||
|
The response to a '_cluster/settings' request differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
vendor: elasticpot
|
||||||
|
product: elasticsearch
|
||||||
|
fofa-query: "index_not_found_exception"
|
||||||
|
tags: elasticpot,elasticsearch,honeypot,ir,cti
|
||||||
|
|
||||||
|
http:
|
||||||
|
- method: GET
|
||||||
|
path:
|
||||||
|
- "{{BaseURL}}/_cluster/settings"
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- 'index_not_found_exception'
|
|
@ -0,0 +1,35 @@
|
||||||
|
id: snare-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Snare Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
Snare honeypot has been identified.
|
||||||
|
The response to an incorrect HTTP version reveals a possible setup of the Snare web application honeypot.
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
verified: true
|
||||||
|
shodan-query: '"Python/3.10 aiohttp/3.8.3" && Bad status'
|
||||||
|
vendor: snare
|
||||||
|
product: http
|
||||||
|
tags: snare,honeypot,ir,cti
|
||||||
|
|
||||||
|
http:
|
||||||
|
- raw:
|
||||||
|
- |
|
||||||
|
GET / HTTP/1337
|
||||||
|
Host: {{Hostname}}
|
||||||
|
|
||||||
|
unsafe: true
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
part: header
|
||||||
|
words:
|
||||||
|
- "Python/3.10 aiohttp/3.8.3"
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
part: body
|
||||||
|
words:
|
||||||
|
- "Bad status line 'Expected dot'"
|
|
@ -0,0 +1,33 @@
|
||||||
|
id: adbhoney-honeypot-cnxn-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: ADBHoney Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
ADBHoney honeypot has been identified.
|
||||||
|
The response to the 'adb connect' command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 4
|
||||||
|
verified: true
|
||||||
|
shodan-query: product:Android Debug Bridge (ADB) && SM-G960F
|
||||||
|
vendor: android
|
||||||
|
product: adb
|
||||||
|
tags: adbhoney,android,adb,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN
|
||||||
|
type: hex
|
||||||
|
- data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO
|
||||||
|
type: hex
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 5555
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "device::http://ro.product.name =starltexx;ro.product.model=SM-G960F"
|
|
@ -0,0 +1,36 @@
|
||||||
|
id: adbhoney-honeypot-shell-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: ADBHoney Honeypot (shell probe) - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
ADBHoney honeypot has been identified.
|
||||||
|
The response to the 'adb shell pwd' command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 4
|
||||||
|
verified: true
|
||||||
|
shodan-query: product:Android Debug Bridge (ADB) && SM-G960F
|
||||||
|
vendor: android
|
||||||
|
product: adb
|
||||||
|
tags: adbhoney,android,adb,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN
|
||||||
|
type: hex
|
||||||
|
- data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO
|
||||||
|
type: hex
|
||||||
|
- data: "4f50454e6b000000000000000a0000009d030000b0afbab1" # OPEN
|
||||||
|
type: hex
|
||||||
|
- data: "7368656c6c3a70776400" # SHELL: PWD
|
||||||
|
type: hex
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 5555
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: binary
|
||||||
|
binary:
|
||||||
|
- "57525445020000006b0000000000000000000000a8adabba"
|
|
@ -0,0 +1,31 @@
|
||||||
|
id: conpot-siemens-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Conpot (Siemens) Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Conpot (Siemens) honeypot has been identified.
|
||||||
|
The response to a first packet of a connection attempt differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
verified: true
|
||||||
|
vendor: conpot
|
||||||
|
product: siemens
|
||||||
|
shodan-query: html:"Overview - Siemens, SIMATIC"
|
||||||
|
tags: conpot,siemens,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "0300001611e00000000400c1020100c2020102c0010a"
|
||||||
|
type: hex
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 102
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: binary
|
||||||
|
binary:
|
||||||
|
- "030000130ed00000000000c1020000c2020000"
|
|
@ -0,0 +1,35 @@
|
||||||
|
id: cowrie-ssh-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Cowrie SSH Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Cowrie (or Twisted) SSH honeypot has been identified.
|
||||||
|
The response to a wrong SSH version differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
vendor: cowrie
|
||||||
|
product: ssh
|
||||||
|
tags: cowrie,twisted,ssh,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "SSH-1337-OpenSSH_9.0\r\n"
|
||||||
|
|
||||||
|
host:
|
||||||
|
- '{{Hostname}}'
|
||||||
|
port: 22
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: regex
|
||||||
|
part: body
|
||||||
|
regex:
|
||||||
|
- 'SSH\-([0-9.-A-Za-z_ ]+)'
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- Protocol major versions differ.
|
||||||
|
- bad version 1337
|
||||||
|
condition: or
|
|
@ -0,0 +1,31 @@
|
||||||
|
id: dionaea-ftp-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Dionaea FTP Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Dionaea FTP honeypot has been identified.
|
||||||
|
The response to the 'PASS' command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 4
|
||||||
|
vendor: dionaea
|
||||||
|
product: ftp
|
||||||
|
tags: dionaea,ftp,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "USER root\r\n"
|
||||||
|
read: 1024
|
||||||
|
- data: "PASS \r\n"
|
||||||
|
read: 1024
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 21
|
||||||
|
read-size: 2048
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "500 Syntax error: PASS requires an argument"
|
|
@ -0,0 +1,31 @@
|
||||||
|
id: dionaea-mqtt-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Dionaea MQTT Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Dionaea MQTT honeypot has been identified.
|
||||||
|
The response to a MQTTv5 packet differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
verified: true
|
||||||
|
shodan-query: product:"MQTT"
|
||||||
|
vendor: dionaea
|
||||||
|
product: mqtt
|
||||||
|
tags: dionaea,mqtt,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "101000044d5154540502003c032100140000"
|
||||||
|
type: hex
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 1883
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: binary
|
||||||
|
binary:
|
||||||
|
- "20020000"
|
|
@ -0,0 +1,33 @@
|
||||||
|
id: dionaea-mysql-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Dionaea MySQL Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A MySQL honeypot has been identified.
|
||||||
|
The response to a connection command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
vendor: dionaea
|
||||||
|
product: mysql
|
||||||
|
tags: dionaea,mysql,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "\x4a\x00\x00\x00\x0a\x35\x2e\x31\x2e\x32\x39\x00\x0b\x00\x00\x00\x21\x3e\x34\x1b\x51\x3f\x34\x33\x60\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00"
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 3306
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers-condition: and
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "5.7.16"
|
||||||
|
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "aaaaaaaa"
|
|
@ -0,0 +1,30 @@
|
||||||
|
id: dionaea-smb-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Dionaea SMB Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Dionaea SMB honeypot has been identified.
|
||||||
|
The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 1
|
||||||
|
shodan-query: port:445
|
||||||
|
vendor: dionaea
|
||||||
|
product: dionaea
|
||||||
|
tags: dionaea,smb,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "00000045ff534d4272000000000801c8000000000000000000000000ffff0100ffff0000002200024e54204c4d20302e31320002534d4220322e3030320002534d4220322e3f3f3f00"
|
||||||
|
type: hex
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 445
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: binary
|
||||||
|
binary:
|
||||||
|
- "6538547e6c42"
|
|
@ -0,0 +1,29 @@
|
||||||
|
id: gaspot-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: GasPot Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A GasPot honeypot has been identified.
|
||||||
|
The response to the '^AI21400' command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
shodan-query: port:10001
|
||||||
|
vendor: gaspot
|
||||||
|
product: veeder-root
|
||||||
|
tags: gaspot,veeder-root,ics,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "^AI21400"
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 10001
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "9999FF1B"
|
|
@ -0,0 +1,29 @@
|
||||||
|
id: mailoney-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Mailoney Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Mailoney (SMTP) honeypot has been identified.
|
||||||
|
The response to the 'HELP' command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
vendor: mailoney
|
||||||
|
product: exim
|
||||||
|
tags: mailoney,exim,smtp,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "HELP\r\n"
|
||||||
|
read: 1024
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 25
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "502 Error: command \"HELP\" not implemented"
|
|
@ -0,0 +1,29 @@
|
||||||
|
id: redis-honeypot-detect
|
||||||
|
|
||||||
|
info:
|
||||||
|
name: Redis Honeypot - Detect
|
||||||
|
author: UnaPibaGeek
|
||||||
|
severity: info
|
||||||
|
description: |
|
||||||
|
A Redis honeypot has been identified.
|
||||||
|
The response to the 'QUIT' command differs from real installations, signaling a possible deceptive setup.
|
||||||
|
metadata:
|
||||||
|
max-request: 2
|
||||||
|
shodan-query: redis
|
||||||
|
vendor: redis
|
||||||
|
product: redis
|
||||||
|
tags: redis,honeypot,ir,cti,network
|
||||||
|
|
||||||
|
tcp:
|
||||||
|
- inputs:
|
||||||
|
- data: "QUIT"
|
||||||
|
|
||||||
|
host:
|
||||||
|
- "{{Hostname}}"
|
||||||
|
port: 6379
|
||||||
|
read-size: 1024
|
||||||
|
|
||||||
|
matchers:
|
||||||
|
- type: word
|
||||||
|
words:
|
||||||
|
- "-ERR unknown command `QUIT`, with args beginning with:"
|
Loading…
Reference in New Issue