Skip to content

subapfell/xz-vulnerable-honeypot

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

7 Commits
 
 
 
 
 
 
 
 
 
 

Repository files navigation

xz-vulnerable-honeypot

An ssh honeypot with the XZ backdoor. CVE-2024-3094

TODO: hook the backdoor

notes: https://gist.github.com/smx-smx/a6112d54777845d389bd7126d6e9f504 https://gist.github.com/q3k/af3d93b6a1f399de28fe194add452d01

Installation

PLEASE run this on a separate isolated system. Docker is not used for isolation, but for getting the libraries working.

The bpf hook alsoo prints EVERY call to execve, including ones outside the container.

Just run

docker compose up

Logs are stored in ./logs/. The current monitoring includes bpftrace monitoring execve syscalls where the parent process is 'sshd', strace monitoring execve syscalls on the parent sshd process, tcpdump recording a pcap (TODO: rotate this) and sshd logging it's regular output (TODO: patch something to log the RSA key).

Configuration

Change the exposed port in docker-compose.yml to change which port sshd listens on.

About

An ssh honeypot with the XZ backdoor. CVE-2024-3094

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 75.0%
  • Dockerfile 25.0%