Skip to content

Dionaea SMB Honeypot - Detect

ID: dionaea-smb-honeypot-detect

Severity: info

Author: UnaPibaGeek

Tags: dionaea,smb,honeypot,ir,cti,network,tcp

A Dionaea SMB honeypot has been identified.The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.

id: dionaea-smb-honeypot-detect
info:
name: Dionaea SMB Honeypot - Detect
author: UnaPibaGeek
severity: info
description: |
A Dionaea SMB honeypot has been identified.
The response to an SMB connection packet differs from real installations, signaling a possible deceptive setup.
metadata:
max-request: 1
vendor: dionaea
product: dionaea
shodan-query: port:445
tags: dionaea,smb,honeypot,ir,cti,network,tcp
tcp:
- inputs:
- data: "00000045ff534d4272000000000801c8000000000000000000000000ffff0100ffff0000002200024e54204c4d20302e31320002534d4220322e3030320002534d4220322e3f3f3f00"
type: hex
host:
- "{{Hostname}}"
port: 445
read-size: 1024
matchers:
- type: binary
binary:
- "6538547e6c42"
# digest: 4a0a00473045022100fd8a0be5994087db950d359d9db4ba534b012639b569a94d5360778f8e4c8c2c022022d4f859f562a1b21239e59dce3042c8e441834678e0253acb8ff337c75cde5d:922c64590222798bb761d5b6d8e72950

This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.

Terminal window
$ nuclei -u "URL" -t "network/honeypot/dionaea-smb-honeypot-detect.yaml"

View on Github