id: adbhoney-honeypot-cnxn-detect info: name: ADBHoney Honeypot - Detect author: UnaPibaGeek severity: info description: | ADBHoney honeypot has been identified. The response to the 'adb connect' command differs from real installations, signaling a possible deceptive setup. metadata: verified: true max-request: 1 vendor: android product: adb shodan-query: - product:Android Debug Bridge (ADB) && SM-G960F - product:android debug bridge (adb) && sm-g960f tags: adbhoney,android,adb,honeypot,ir,cti,network,tcp tcp: - inputs: - data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN type: hex - data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO type: hex host: - "{{Hostname}}" port: 5555 read-size: 1024 matchers: - type: word words: - "device::http://ro.product.name =starltexx;ro.product.model=SM-G960F" # digest: 4a0a0047304502207e34cc15f4c924da0c9d4a0503c200d32601b7a5ec6cc3b673ed1cd9a89bc6c70221008a9322bfa10d42bd5fbb3210dd854ce328e5e42b339f1af2c429820147bedd98:922c64590222798bb761d5b6d8e72950