Skip to content

ADBHoney Honeypot - Detect

ID: adbhoney-honeypot-cnxn-detect

Severity: info

Author: UnaPibaGeek

Tags: adbhoney,android,adb,honeypot,ir,cti,network,tcp

ADBHoney honeypot has been identified.The response to the ‘adb connect’ command differs from real installations, signaling a possible deceptive setup.

id: adbhoney-honeypot-cnxn-detect
info:
name: ADBHoney Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
ADBHoney honeypot has been identified.
The response to the 'adb connect' command differs from real installations, signaling a possible deceptive setup.
metadata:
verified: true
max-request: 1
vendor: android
product: adb
shodan-query:
- product:Android Debug Bridge (ADB) && SM-G960F
- product:android debug bridge (adb) && sm-g960f
tags: adbhoney,android,adb,honeypot,ir,cti,network,tcp
tcp:
- inputs:
- data: "434e584e0100000100001000ea000000445b0000bcb1a7b1" # CNXN
type: hex
- data: "686f73743a3a66656174757265733d7368656c6c5f76322c636d642c737461745f76322c6c735f76322c66697865645f707573685f6d6b6469722c617065782c6162622c66697865645f707573685f73796d6c696e6b5f74696d657374616d702c6162625f657865632c72656d6f756e745f7368656c6c2c747261636b5f6170702c73656e64726563765f76322c73656e64726563765f76325f62726f746c692c73656e64726563765f76325f6c7a342c73656e64726563765f76325f7a7374642c73656e64726563765f76325f6472795f72756e5f73656e642c6f70656e73637265656e5f6d646e73" # CLIENT INFO
type: hex
host:
- "{{Hostname}}"
port: 5555
read-size: 1024
matchers:
- type: word
words:
- "device::http://ro.product.name =starltexx;ro.product.model=SM-G960F"
# digest: 4a0a004730450221009ab40070da6df4b369921c46faf43cfcb0a137e35976781055cd55174ab28a43022020781a8ae98623b4b967961a3db1d2a10c9c57c28c631ec4b832d360a61caccb:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "network/honeypot/adbhoney-honeypot-cnxn-detect.yaml"

View on Github