Skip to content

Snare Honeypot - Detect

ID: snare-honeypot-detect

Severity: info

Author: UnaPibaGeek

Tags: snare,honeypot,ir,cti

Snare honeypot has been identified.The response to an incorrect HTTP version reveals a possible setup of the Snare web application honeypot.

id: snare-honeypot-detect
info:
name: Snare Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
Snare honeypot has been identified.
The response to an incorrect HTTP version reveals a possible setup of the Snare web application honeypot.
metadata:
verified: true
max-request: 1
vendor: snare
product: http
shodan-query:
- '"Python/3.10 aiohttp/3.8.3" && Bad status'
- '"python/3.10 aiohttp/3.8.3" && bad status'
tags: snare,honeypot,ir,cti
http:
- raw:
- |
GET / HTTP/1337
Host: {{Hostname}}
unsafe: true
matchers-condition: and
matchers:
- type: word
part: header
words:
- "Python/3.10 aiohttp/3.8.3"
- type: word
part: body
words:
- "Bad status line 'Expected dot'"
# digest: 4a0a00473045022100879ce25e64da8ae6172482e2915f7a46be73dfe69989a78f1edca62e4fb3919702203a751c4ba3547eb72f3d07549e77d0607ab8ac168c76f41bb8f58f2cb0789b94:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "http/honeypot/snare-honeypot-detect.yaml"

View on Github