Yeah. I set up one with username root, password root, and it was
compromised in less than 12 hours.


On Sat, Feb 22, 2014 at 11:59 PM, Ian Trump <[email protected]> wrote:

> Cool, you should talk to Alex he's made kind if a tar pit out of a droplet
> to grab malware. It looks like root but is not :)
>
> Sent from my iPhone
>
> On 2014-02-22, at 23:47, "Theo Baschak" <[email protected]> wrote:
>
> > So after a discussion I had with a few members after the last weekly
> meeting I setup a kippo ssh honeypot. -> https://code.google.com/p/kippo/
> >
> > Surprisingly, no one has successfully bruteforced it yet! even though
> root password is 123456
> >
> > Theres been 3853 attempts though over the last 4 days, lots including
> 123456 but not equal to it (s123456, 123456a).
> >
> > Seems admin is a very poor root password choice, every bruteforce
> attempt session has started with this password.
> >
> > --
> > Theo
> > _______________________________________________
> > SkullSpace Discuss Mailing List
> > Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
> > Archive: https://groups.google.com/group/skullspace-discuss-archive/
> _______________________________________________
> SkullSpace Discuss Mailing List
> Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
> Archive: https://groups.google.com/group/skullspace-discuss-archive/
>
_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/

Reply via email to