Skip to content

lockness-Ko/xz-vulnerable-honeypot

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

17 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

xz-vulnerable-honeypot

An ssh honeypot with the XZ backdoor. CVE-2024-3094

TODO: hook the backdoor and/or sshd. log rsa keys for decryption.

notes:

Warning

PLEASE run this on a separate isolated system. Docker is configured in a way that allows a threat actor to easily escape it. Docker is only used to get all the shared libraries working and configured.

Installation

Install notify by projectdiscovery using the following command:

go install -v github.com/projectdiscovery/notify/cmd/notify@latest

Run the following command to start the honeypot:

./monitor.sh DISCORD_WEBHOOK_URL

e.g.

./monitor.sh https://discord.com/api/webhooks/12345678909876/aaaaaaaa

This will use notify to send all logs to a discord webhook.

How it works

The vulnerable version of xz (5.6.1) and the liblzma linked version of sshd from the fedora repositories are ran in the configuration that activates the backdoor. Monitoring is provided by bpftrace, strace, tcpdump, and the sshd process itself.

  • bpftrace
    • Syscall monitoring and shared library hooking.
  • strace
    • Syscall montioring for the parent sshd process.
  • tcpdump
    • Capturing packets.
  • sshd
    • Login events (NOTE This will most likely not capture the login event for a bad actor as the backdoor uses set_log_mask to change the logging behaviour when the attacker attempts to login)

About

An ssh honeypot with the XZ backdoor. CVE-2024-3094

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published