Quantcast
Channel: Edgis » ssh
Viewing all articles
Browse latest Browse all 5

Kippo: 02 User & Password Management

$
0
0

In the previous episode, I’ve demonstrated how to set up a Kippo SSH honeypot, and ended with a series of unsuccessful password brute-force attack. In this episode, I will be covering fake user and password management of your Kippo SSH honeypot.

Username-Password Combination

Unlike Kojoney where you have a text file that state all the username and password combination it accepts, Kippo is slightly more advance than that. By default, the only root password is “123456”.

If you want to accept more username and password combination than that, you can append it to data/userdb.txt.

New Password 01

Successful Logins

In addition, if a successful login launched a passwd command, the new password will also be appended to the file.

Passwd toor

New Password 02

In other word, you can look at the trend of password these intruders like to change to.

New Users

To add a new fake user into your Kippo SSH honeypot, you cannot simply use the useradd command within the honeypot. However, the useradd command provides a more interesting feature:

Useradd

It will be interesting if you can collect personal information about the intruder.

To add a new user, you just have to append your new username and password combination into the data/userdb.txt file.

New User

Similarly, if a successful login to that user launched a passwd command, the new password will be appended to the file.

New User Login

New Edgis Password

Explore your Kippo!

By now, you would have successful logged into your Kippo SSH honeypot. Explore around with it, and you will realise you get some return values from some basic Linux commands (e.g. w, ps, ls, etc.), unlike Kojoney which always tells you that command is not found.

That’s all for now; I will drill more into the sticky factor of Kippo in the next episode. :)


Viewing all articles
Browse latest Browse all 5

Trending Articles