Skip to content

Dionaea HTTP Honeypot - Detect

ID: dionaea-http-honeypot-detect

Severity: info

Author: UnaPibaGeek

Tags: dionaea,honeypot,ir,cti

Dionaea HTTP honeypot has been identified.The response to an incorrect HTTP method reveals a possible setup of the Dioanea web application honeypot.

id: dionaea-http-honeypot-detect
info:
name: Dionaea HTTP Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
Dionaea HTTP honeypot has been identified.
The response to an incorrect HTTP method reveals a possible setup of the Dioanea web application honeypot.
metadata:
max-request: 1
vendor: dionaea
product: http
shodan-query: '"python/3.10 aiohttp/3.8.3" && bad status'
tags: dionaea,honeypot,ir,cti
http:
- raw:
- |
AAAA / HTTP/1.1
Host: {{Hostname}}
unsafe: true
matchers-condition: and
matchers:
- type: status
status:
- 501
- type: word
part: header
words:
- "nginx"
- type: word
part: body
words:
- '<?xml version="1.0" encoding="ascii"?>'
# digest: 4a0a0047304502210095f47c728d5bece198e0bdacc590a2762dfaea7ab5d851db00cba755924203ef02206cf1ff3c15ba80cd4240acd1c294ff0d22db36f57523ad0bc3846a71a7ae3808:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/honeypot/dionaea-http-honeypot-detect.yaml"

View on Github