Skip to content

Dionaea MQTT Honeypot - Detect

ID: dionaea-mqtt-honeypot-detect

Severity: info

Author: UnaPibaGeek

Tags: dionaea,mqtt,honeypot,ir,cti,network,tcp

A Dionaea MQTT honeypot has been identified.The response to a MQTTv5 packet differs from real installations, signaling a possible deceptive setup.

id: dionaea-mqtt-honeypot-detect
info:
name: Dionaea MQTT Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Dionaea MQTT honeypot has been identified.
The response to a MQTTv5 packet differs from real installations, signaling a possible deceptive setup.
metadata:
verified: true
max-request: 1
vendor: dionaea
product: mqtt
shodan-query:
- product:"MQTT"
- product:"mqtt"
tags: dionaea,mqtt,honeypot,ir,cti,network,tcp
tcp:
- inputs:
- data: "101000044d5154540502003c032100140000"
type: hex
host:
- "{{Hostname}}"
port: 1883
read-size: 1024
matchers:
- type: binary
binary:
- "20020000"
# digest: 490a004630440220348a535d8f7f4d356fa38afa3db3a15f14495ae06211c86827c5748c94444e2d0220637d2f464474d002b05b83279a42099e1451c5d98f4489cee2c2e505cc073927:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "network/honeypot/dionaea-mqtt-honeypot-detect.yaml"

View on Github