Have this at work, actually. It's fun to watch what they try after
breaking in, initially, but it quickly becomes repetitive. Kippo keeps a
copy of everything they download in the 'shell', too, which is
instructive.
On Sat, 22 Feb 2014, Theo Baschak wrote:
So after a discussion I had with a few members after the last weekly
meeting I setup a kippo ssh honeypot. ->
https://code.google.com/p/kippo/
Surprisingly, no one has successfully bruteforced it yet! even though root
password is 123456
Theres been 3853 attempts though over the last 4 days, lots including 123456
but not equal to it (s123456, 123456a).
Seems admin is a very poor root password choice, every bruteforce attempt
session has started with this password.
--
Theo
_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/
_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/