Have this at work, actually. It's fun to watch what they try after breaking in, initially, but it quickly becomes repetitive. Kippo keeps a copy of everything they download in the 'shell', too, which is instructive.

On Sat, 22 Feb 2014, Theo Baschak wrote:

So after a discussion I had with a few members after the last weekly meeting I setup a kippo ssh honeypot. -> https://code.google.com/p/kippo/

Surprisingly, no one has successfully bruteforced it yet! even though root 
password is 123456

Theres been 3853 attempts though over the last 4 days, lots including 123456 
but not equal to it (s123456, 123456a).

Seems admin is a very poor root password choice, every bruteforce attempt 
session has started with this password.

--
Theo
_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/

_______________________________________________
SkullSpace Discuss Mailing List
Help: http://www.skullspace.ca/wiki/index.php/Mailing_List#Discuss
Archive: https://groups.google.com/group/skullspace-discuss-archive/

Reply via email to