In this post, I am just outlining some details from trying out a relatively new honeypot named Heralding, developed by the well known Honeynet Project developer, Johnny Vestergaard.
Heralding is a designed to simply catch login attempts over several different protocols and subsequent activities. It supports the following protocols:
ftp
http/https
telnet
pop3/pop3s
ssh
smtp
Data
Heralding logs its data as CSV when logged to files or JSON if logged via ZMQ.
Each record contains the following fields:
timestamp
auth_id
session_id
source_ip
source_port
destination_ip,
destination_port
protocol
username
password
Example Data
Loggers
Syslog alert
Local CSV file
JSON over ZMQ
Installation
This is my recommended installation steps. I usually use python virtualenv in order to keep the install isolated from the rest of my environment.
Configuration
Running
Running this command will allow you to run the honeypot and test the config you just created (config is loaded from current working directory or it uses the default config).
You should see output like this:
Deployment
When deploying honeypots, I prefer to use supervisord to manage the auto starting/stopping/restarting the sensor upon reboots and failures. So here is how I have deployed heralding:
Check the status:
Experience
I ran just one instance of heralding for ~10 hours and caught 3077 events (mostly login attempts), all over telnet. My raw log file can be downloaded here. Here are some stats about what this sensor saw.
Top IPs:
Top Usernames:
Top Passwords:
IoT Attacks
After reviewing the logs closer, it appears that all of the “enable” and “shell” usernames and “system” and “sh” passwords are not username/passwords, but instead, they are commands that are attempted after the attacker attempts to login with one of the following sets of creds. These are well known IoT default creds and most of them are embedded in the Mirai scanner source code.
Another IoT related pattern I observed was what appear to be busybox default creds being used to login, download a payload via tftp, and execute it. Unfortunately, I have not be able to download any of the payload files yet, they all timeout.
Creds attempted:
Commands tried:
Final Thoughts
Malicious login attempts are very common, esp with IoT devices shipping with hardcoded credentials. Heralding makes collecting these login attempts easy since it is a simple, but effective honeypot for capturing credentials attempted over a variety of different protocols.
Heralding is implemented in python and because of its modular logger design, it would be relatively straightforward to add MHN support for this honeypot, so if time permits I might do this.
If you wanted to explore the data collected by my instance of heralding, you can download my log file here: here.
Lastly, consider donating to the Honeynet Project: