Yeah. I set up one with username root, password root, and it was compromised in less than 12 hours.
On Sat, Feb 22, 2014 at 11:59 PM, Ian Trump <[email protected]> wrote: > Cool, you should talk to Alex he's made kind if a tar pit out of a droplet > to grab malware. It looks like root but is not :) > > Sent from my iPhone > > On 2014-02-22, at 23:47, "Theo Baschak" <[email protected]> wrote: > > > So after a discussion I had with a few members after the last weekly > meeting I setup a kippo ssh honeypot. -> https://code.google.com/p/kippo/ > > > > Surprisingly, no one has successfully bruteforced it yet! even though > root password is 123456 > > > > Theres been 3853 attempts though over the last 4 days, lots including > 123456 but not equal to it (s123456, 123456a). > > > > Seems admin is a very poor root password choice, every bruteforce > attempt session has started with this password. > > > > -- > > Theo > > _______________________________________________ > > SkullSpace Discuss Mailing List > > Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss > > Archive: https://groups.google.com/group/skullspace-discuss-archive/ > _______________________________________________ > SkullSpace Discuss Mailing List > Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss > Archive: https://groups.google.com/group/skullspace-discuss-archive/ >
_______________________________________________ SkullSpace Discuss Mailing List Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss Archive: https://groups.google.com/group/skullspace-discuss-archive/
