nuclei-templates/network/honeypot/conpot-siemens-honeypot-det...

29 lines
711 B
YAML

id: conpot-siemens-honeypot-detect
info:
name: Conpot (Siemens) Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Conpot (Siemens) honeypot has been identified.
The response to a first packet of a connection attempt differs from real installations, signaling a possible deceptive setup.
metadata:
max-request: 2
vendor: conpot
product: siemens
tags: conpot,siemens,honeypot,ir,cti,network
tcp:
- inputs:
- data: "0300001611e00000000400c1020100c2020102c0010a"
type: hex
host:
- "{{Hostname}}"
port: 102
read-size: 1024
matchers:
- type: binary
binary:
- "030000130ed00000000000c1020000c2020000"