sec-chick Blog

サイバーセキュリティブログ

【ハニーポット簡易分析】Honeypot簡易分析(340-343日目:7/25-28)

Honeypot簡易分析(340-343日目:7/25-28)となります。

◾️Honeytrap
※80ポートは除く
<国別検知数および検知数>

f:id:one-chick-sec:20190729193502p:plain

<ポート検知数(30日平均比)>
 
ポート番号 サービス 件数 件数差(30日平均)
445 smb 15828 11929
23 telnet 7194 5842
5900 vnc 1349 968
3127 Unknown  1287 1286
24258 Unknown  1285 1285
34653 Unknown  1284 1284
25289 Unknown  1278 1278
29981 Unknown 1269 1269
34221 Unknown 1269 1269
38350 Unknown 1268 1268
複数ポートでの通信を検知していますが、こちらはRDPヘの不正アクセスを試みる通信となっています。(ちょくちょく、検知している通信となります)
ペイロード
...)$......Cookie: mstshash=NCRACK_USER..

<新規マルウェアダウンロード>
malware_download 攻撃例
51[.]81[.]7[.]103 POST /ctrlt/DeviceUpgrade_1
hxxp://104[.]168[.]215[.]139/mips POST /picsdesc.xml
hxxp:/\/80[.]211[.]9[.]40/bins/a[.]arm5 GET /shell?cd%20/tmp;
188[.]165[.]179[.]15 POST /ctrlt/DeviceUpgrade_1
hxxp://192[.]236[.]162[.]197/vb/Amakano[.]mpsl POST /tmUnblock.cgi
hxxp://51[.]89[.]143[.]177/Demon[.]mips POST /picsdesc.xml 
hxxp://185[.]246[.]152[.]89/bins/telnet[.]arm GET /shell?cd%20/tmp;
hxxp:/\/91[.]211[.]244[.]92/arm6 GET /shell?cd%20/tmp;
147[.]135[.]116[.]71 POST /ctrlt/DeviceUpgrade_1


◾️WoWHoneeypot
<国別検知数および検知数>

f:id:one-chick-sec:20190729194326p:plain

<検知パス一覧>
wow_path_research target CVE reference count
/admin/assets/js/views/login.js FreePBX - https://git.freepbx.org/projects/FREEPBX/repos/framework/browse/amp_conf/htdocs/admin/assets/js/views/login.js?at=bfb36fa7ac70c2e642257dbcd99a1799e19ea743 103
/ - - - 101
/robots.txt - - - 6
/favicon.ico - - - 5
/TP/public/index.php ThinkPHP - - 4
/manager/html Tomcat - - 3
/phpmyadmin phpMyAdmin - - 3
/.well-known/security.txt SSL certificate - https://qiita.com/comefigo/items/e9b1bce93c1b615e5934 2
/sitemap.xml xml sitemap - - 2
45.79.32.208:60606       2
hxxp://www.baidu.com/ Unauthorized Relay - - 2
www.baidu.com:443 Unauthorized Relay - - 2
//recordings/misc/play_page.php       1
/MyAdmin/scripts/setup.php phpMyAdmin - - 1
/admin/config.php Admin config - - 1
/cgi-bin/user/Config.cgi AVTECH AVN801 DVR CVE-2013-4981 https://jvndb.jvn.jp/ja/contents/2013/JVNDB-2013-006100.html 1
/current_config/passwd dahua camera - https://github.com/mcw0/PoC/blob/master/dahua-backdoor-PoC.py 1
/currentsetting.htm NETGEAR Genie - https://qiita.com/comefigo/items/e9b1bce93c1b615e5934 1
/device_description.xml UPnP - https://medium.com/@djboris/digging-into-upnp-by-searching-a-sonos-api-5e10e080a232 1
/login.asp Login Page - - 1
/login/login.html       1
/manager/text/list       1
/myadmin/scripts/setup.php       1
/phpMyAdmin/scripts/setup.php       1
/phpmyadmin/scripts/setup.php       1
/pma/scripts/setup.php       1
/scripts/setup.php phpMyAdmin - - 1
/shell Webshell - - 1
/winbox.png MikroTik - https://sec-owl.hatenablog.com/entry/2018/10/12/160525 1
hxxp://123.125.114.144/ Unauthorized Relay - - 1
<新規検知パス一覧>
wow_path_research target CVE reference count
//recordings/misc/play_page.php FreePBX - https://sec23.hatenablog.com/entry/2019/07/24/233000 1
/login/login.html login Page - - 1
/manager/text/list Tomcat - https://tomcat.apache.org/tomcat-7.0-doc/manager-howto.html 1
/myadmin/scripts/setup.php phpMyAdmin - - 1
/phpMyAdmin/scripts/setup.php phpMyAdmin - - 1
/phpmyadmin/scripts/setup.php phpMyAdmin - - 1
/pma/scripts/setup.php phpMyAdmin - - 1
45[.]79[.]32[.]208:60606 Unauthorized Relay - - 2

「/manager/text/list」について
Tomcat関連で現在デプロイされているアプリケーションのリストを表示させるものとなります。アクセス可能な場合、以下のような情報が表示されます。

OK - Listed applications for virtual host localhost
/webdav:running:0:webdav
/examples:running:0:examples
/manager:running:0:manager
/:running:0:ROOT
/test:running:0:test##2
/test:running:0:test##1


マルウェアダウンロード>
なし

◾️Suricata(参考)
alert.category alert.signature count
Generic Protocol Command Decode SURICATA STREAM ESTABLISHED SYN resend with different seq 9913
Generic Protocol Command Decode SURICATA STREAM ESTABLISHED SYNACK resend with different ACK 6618
Generic Protocol Command Decode SURICATA STREAM Packet with invalid ack 6220
Generic Protocol Command Decode SURICATA STREAM ESTABLISHED invalid ack 6218
Generic Protocol Command Decode SURICATA STREAM Packet with broken ack 4843
Not Suspicious Traffic ET INFO Potentially unsafe SMBv1 protocol in use 4662
Generic Protocol Command Decode SURICATA IPv4 padding required 2751
Potentially Bad Traffic GPL SCAN loopback traffic 2728
Generic Protocol Command Decode SURICATA STREAM 3way handshake SYN resend different seq on SYN recv 1806
Generic Protocol Command Decode SURICATA STREAM 3way handshake SYNACK resend with different ack 1765
Generic Protocol Command Decode SURICATA STREAM ESTABLISHED SYNACK resend 1189
Generic Protocol Command Decode SURICATA STREAM Packet with invalid timestamp 992
Misc activity GPL ICMP_INFO Destination Unreachable Communication with Destination Host is Administratively Prohibited 727
Generic Protocol Command Decode SURICATA STREAM 3way handshake SYNACK with wrong ack 394
Generic Protocol Command Decode SURICATA HTTP missing Host header 392
Misc activity ET POLICY SSH session in progress on Unusual Port 308
Misc activity ET POLICY SSH Client Banner Detected on Unusual Port 297
Generic Protocol Command Decode SURICATA STREAM RST recv but no session 248
Generic Protocol Command Decode SURICATA STREAM FIN recv but no session 211
Generic Protocol Command Decode SURICATA Applayer Detect protocol only one direction 122
Generic Protocol Command Decode SURICATA STREAM 3way handshake wrong seq wrong ack 121
Generic Protocol Command Decode SURICATA SMTP no server welcome message 102
Generic Protocol Command Decode SURICATA UDPv4 invalid checksum 95
Generic Protocol Command Decode SURICATA Applayer Wrong direction first Data 80
Generic Protocol Command Decode SURICATA TCPv4 invalid checksum 68
Generic Protocol Command Decode SURICATA TLS invalid record/traffic 28
Generic Protocol Command Decode SURICATA zero length padN option 26
Misc activity GPL MISC Time-To-Live Exceeded in Transit 25
Attempted Administrator Privilege Gain ET EXPLOIT Linksys E-Series Device RCE Attempt Outbound 24
Generic Protocol Command Decode SURICATA ICMPv4 unknown code 22
Generic Protocol Command Decode SURICATA TLS handshake invalid length 20
Generic Protocol Command Decode SURICATA TLS invalid record type 20
Generic Protocol Command Decode SURICATA Applayer Mismatch protocol both directions 16
Generic Protocol Command Decode SURICATA TLS error message encountered 16
Potentially Bad Traffic ET POLICY Inbound RDP Connection with Minimal Security Protocol Requested 16
Generic Protocol Command Decode SURICATA STREAM TIMEWAIT ACK with wrong seq 15
Potentially Bad Traffic ET POLICY Tunneled RDP msts Handshake 15
Generic Protocol Command Decode SURICATA STREAM bad window update 14
Generic Protocol Command Decode SURICATA STREAM excessive retransmissions 11
Generic Protocol Command Decode SURICATA TCP option invalid length 11
Generic Protocol Command Decode SURICATA STREAM suspected RST injection 9
Generic Protocol Command Decode SURICATA TLS invalid handshake message 8
Generic Protocol Command Decode SURICATA HTTP unable to match response to request 6
Generic Protocol Command Decode SURICATA Modbus invalid Value 6
Misc activity GPL ICMP_INFO Destination Unreachable Communication Administratively Prohibited 6
Generic Protocol Command Decode SURICATA ICMPv4 invalid checksum 5
Misc activity ET INFO Cisco Smart Install Protocol Observed 5
Generic Protocol Command Decode SURICATA STREAM FIN out of window 4
Generic Protocol Command Decode SURICATA Modbus invalid Length 2
Generic Protocol Command Decode SURICATA STREAM FIN2 FIN with wrong seq 2
Generic Protocol Command Decode SURICATA STREAM SHUTDOWN RST invalid ack 2
A Network Trojan was Detected ET EXPLOIT Eir D1000 Modem CWMP Exploit RCE 1
Generic Protocol Command Decode SURICATA HTTP Host part of URI is invalid 1
Generic Protocol Command Decode SURICATA STREAM SYN resend 1
Misc activity ET CHAT IRC NICK command 1
Misc activity ET CHAT IRC USER command 1
 

以上となります。