honeytrap – sample attacks

This page contains attacks trapped with honeytrap. Some of the data has been sanitized. Most of the files contain malicious code and can smash your computer system. If you download and analyze them, be careful!

Date File Port Description
2007-02-19 xmldb_ftp_bo.htdump 2100/tcp Exploitation attempt of a buffer overflow in XDB FTP UNLOCK command in Oracle 9i.
2007-01-30 ssl_too_open.htdump 443/tcp OpenSSL still too open.
2006-12-29 sql_slammer.htdump 1434/udp SQL Slammer infection attempt (exploited vulnerability described in CERT advisory CA-2003-04).
2006-12-28 snmp_get_public.htdump 161/udp A SNMP GET request on the public community.
2006-12-28 opaserv_w.htdump 139/tcp Another variant of the Opasoft worm that spreads via open network shares on Windows machines.
2006-12-17 ssh_connect.htdump 22/tcp Rejected Secure Shell (SSH) connection attempt.
2006-12-17 dht_ping_query.htdump 61764/udp BitTorrent "distributed sloppy hash table" (DHT) protocol ping query.
2006-12-12 opasoft_infect.htdump 139/tcp A sample of the Opasoft.D worm that exploits weak share level password in old Windows flavors.
2006-12-07 big_yellow.htdump 2967/tcp Big Yellow worm exploiting a remote stack overflow in Symantec Remote Management.
2006-11-29 messenger_spam.htdump 1026/udp Windows Messenger spam message that tries to trick you into installing an "update".
2006-11-21 weird_backdoor.htdump 17300/tcp An IRC bot spreading via a backdoor left behind by a virus from 2001 called Win32.Weird.
2006-11-20 rtvscan_bo.htdump 2967/tcp A buffer overflow exploit, maybe for the stack overflow in Symantec's realtime virus scanner.
2006-11-13 pnp_exp.htdump 5000/tcp Exploit for the Microsoft Plug and Play vulnerability (see MS05-039).
2006-11-10 msdtc_exp.htdump 1025/tcp Shellcode for the remote code execution vulnerability in the MSDTC (MS05-051).
2006-11-08 dameware_bo.htdump 6129/tcp 3 years old stack overflow exploit for a Dameware vulnerability (see this posting).
2006-10-22 optix_backdoor.htdump 3410/tcp Attempt to log into a backdoor in the Optix trojan using a built-in leaked master password.
2006-10-08 grims_ping.htdump 21/tcp Output from a tool called Grim's Ping that scans for anonymous ftp servers.
2006-10-01 mydoom_hunter.htdump 3127/tcp MyDoom Hunter still spreading! (Infos at W32.Doomhunter description).
2006-10-01 ftp_dl_run.htdump 48879/tcp Yet another set of commands to download an executable via FTP and launch it.
2006-09-29 netbios_spread.htdump 139/tcp A portable executable submitted via NETBIOS, probably a malware (not analyzed).
2006-09-15 webmail_inc.htdump 32000/tcp GET request that includes a php script via an IceWarp WebMail weakness (OSVDB ID 22077).
2006-09-09 phpmy_worm.htdump 80/tcp A malware spreading via phpMyAdmin by inserting the binary executable into the database.
2006-09-01 dipnet_scan.htdump 15118/tcp Dipnet scan for already infected hosts (details can be found in the analysis by LURHQ).
2006-08-31 sserv_meta.htdump 445/tcp Exploitation attemts using the Metasploit server service exploit.
2006-08-28 vbs_dload.htdump 4444/tcp VBS script to download and run a bot executable echoed on a backdoor shell.
2006-08-17 me_imapd_bo.htdump 143/tcp Buffer overflow exploit against the LOGIN command in MailEnable Imapd (reported here in 2005).
2006-08-12 sserv_exp.htdump 445/tcp Exploit for the critical remote code execution hole in the Windows server service (MS-06-040).
2006-08-12 veritas_exp.htdump 6101/tcp Buffer overflow exploit against Veritas Backup Agent Browser (exploit by Hat-Squad).
2006-08-10 dirtr_cmd.htdump 80/tcp A directory traversal cmd.exe access successfully mirrored back to the miscreant.
2006-08-07 weak_vnc.htdump 5900/tcp Exploit for weak vnc servers (most likely without password) to download malware via http.
2006-08-06 dirtr_shadow.htdump 10000/tcp Directory traversal attack to retreive /etc/shadow via http.
2006-07-29 licmgr_exp.htdump 10616/tcp Exploit for buffer overflow vulnerability in EIQ Licence manager (see Metasploit exploit).
2006-06-30 arcserve_bo.htdump 41523/tcp Exploit for one of those buffer overflow vulnerabilities in BrightStor ARCserve Backup.
2006-06-20 wins_exp.htdump 42/tcp Buffer overflow exploit against Microsoft WINS (see Microsoft Security Bulletin MS04-045).
2006-05-27 ftp_dl.htdump 8655/tcp Commands subitted to a backdoor shell to download a file via ftp (honeytrap did) and run it.
2006-05-27 lsass_exp.htdump 445/tcp Buffer overflow exploit against Microsoft LSASS (see Microsoft Security Bulletin ms04-011).
2006-05-25 relay_scan.htdump 25/tcp Scan for open SMTP relays.
2006-05-23 pop3_bo.htdump 110/tcp Buffer overflow exploit attacking the POP3 APOP command (could be CVE-2000-0840).
2006-05-23 mw_ftp_bo.htdump 1023/tcp Buffer overflow attack against the FTP PORT command, most likely for malware builtin servers.
2006-05-15 dcerpc_exp.htdump 135/tcp Exploit for the Netbios DCERPC vulnerability (see Microsoft Security Bulletin MS03-026).
2006-04-20 mysql_worm.htdump 3306/tcp Worm-like MySQL exploit that bruteforces root password and then installs and runs itself.
2006-04-15 xmlrpc_exp.htdump 80/tcp Exploit against PHP XMLRPC (see CVE-2005-1921) that installs and runs a file.
2006-03-25 ascii2pe.htdump 46695/tcp Batch script that creates a vaild PE executable by printing base64-like strings into a file.
2006-02-07 asn1_exp.htdump 139/tcp Remote root exploit for a buffer overflow in NetBios NTLMSSP (MS04-077).
2005-10-29 cpanel_rstpass.htdump 2082/tcp Malware download attempt via the cpanel password reset weakness (OSVDB ID 4205).
2005-09-06 distcc_exp.htdump 3632/tcp DistCC daemon remote exploit that opens a reverse shell (using this Metasploit exploit).




honeytrap was written by Tillmann Werner.

Powered by Sourceforge. Valid XHTML 1.0
SourceForge.net Logo Valid XHTML 1.0 Strict