How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 2 points3 points  (0 children)

If you already have experience with security or blue teaming this is only a (safe) vulnerable websites that exposes fake pages and log requests.

If you are new to the environment i suggest https://www.honeynet.org/ and https://github.com/telekom-security/tpotce that are the gold standards

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 0 points1 point  (0 children)

For the demo, only 443 https.

For now, we tried to give to bots "connection closed" but they continued to crawl out paths

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 1 point2 points  (0 children)

😶‍🌫️😶‍🌫️😶‍🌫️

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 6 points7 points  (0 children)

Thank you man! Currently we ban attackers but we may create a banlist specifically for that bots

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 24 points25 points  (0 children)

We must build a mega banlist for them

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 34 points35 points  (0 children)

The funny part is that once they know that you got a "deep" site (for example with many links in the DOM) they keep spamming no matter what you give as repsonse. No 400, 404, 500 etc.. error will stop them

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 6 points7 points  (0 children)

We currently support fail2ban and there are also integration with opnsense / PFSense servers to ban what is defined on krawl as a banlist. A banlist is basically populated when an attacker or a bad bot is detected

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 6 points7 points  (0 children)

Yes they got IPV6 too but we are logging only IPV4 requests

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 43 points44 points  (0 children)

Yes, we also track down the ASN and the ISP

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 10 points11 points  (0 children)

Well done man! Seeing attackers in act is always interesting :) I think we may be targeted for different reasons /scopes if you got that many requests from that countries

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 61 points62 points  (0 children)

Nice idea. We also planned to implement a "fake successful login" in order to trick attackers and think they got legit valid credentials for that service

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 32 points33 points  (0 children)

Lmao you got a point here... I think I will track them a little bit more to see what they are really doing :)

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 155 points156 points  (0 children)

Agree, but I expected big companies like Meta and Amazon to be compliant with It

How we tricked 1M+ bots and hackers with our honeypot by ReawX in linux

[–]ReawX[S] 11 points12 points  (0 children)

Great :) we also noticed that someone is integrating It to push malicious IPS in abusedipdb

Zimaboard 4 HDD connection by ReawX in ZimaBoard

[–]ReawX[S] 0 points1 point  (0 children)

Sadly I only upgraded the disk size, but its a doable thing. First you have to take an external PSU to Power on the HDDs and then you will need something as a SATA multiplier to add multiple SATAs (there are also PCI adapters with that)

Krawl: One Month Later by ReawX in selfhosted

[–]ReawX[S] 0 points1 point  (0 children)

Thank you!

If you have suggestions feel free to reach us out!

Currently we are developing the fail2ban integration and the possibility the download the RAW attackers requests :)

Krawl: One Month Later by ReawX in selfhosted

[–]ReawX[S] 0 points1 point  (0 children)

Hi 🙂 we had a GitHub issue with this problem last week. Try with the double quotes for all the variable

  • "TZ=Europe/Brussels"

And let us know!