Extending a Thinkst Canary to become an interactive honeypot
Tags
attack-pattern: | Credentials - T1589.001 Python - T1059.006 Server - T1583.004 Server - T1584.004 Software - T1592.002 Ssh - T1021.004 Trap - T1546.005 Tool - T1588.002 Sudo - T1169 Trap - T1154 |
Common Information
Type | Value |
---|---|
UUID | dd6a87f2-3a66-4cc1-bfb7-cec864e4efbc |
Fingerprint | b41a2239fe25a1d0 |
Analysis status | DONE |
Considered CTI value | 0 |
Text language | |
Published | Sept. 14, 2020, 10:54 a.m. |
Added to db | Jan. 18, 2023, 10:17 p.m. |
Last updated | Nov. 17, 2024, 4:47 p.m. |
Headline | Extending a Thinkst Canary to become an interactive honeypot |
Title | Extending a Thinkst Canary to become an interactive honeypot |
Detected Hints/Tags/Attributes | 44/1/12 |
Source URLs
URL Provider
Attributes
Details | Type | #Events | CTI | Value |
---|---|---|---|---|
Details | Domain | 258 | nmap.org |
|
Details | Domain | 25 | help.ubuntu.com |
|
Details | Domain | 21 | landscape.canonical.com |
|
Details | Domain | 64 | ubuntu.com |
|
Details | IPv4 | 1 | 192.168.0.29 |
|
Details | IPv4 | 25 | 172.17.0.1 |
|
Details | IPv4 | 1 | 10.43.5.23 |
|
Details | Url | 132 | https://nmap.org |
|
Details | Url | 92 | https://nmap.org/submit |
|
Details | Url | 19 | https://help.ubuntu.com |
|
Details | Url | 20 | https://landscape.canonical.com |
|
Details | Url | 15 | https://ubuntu.com/advantage |