Airtell Router Scans, and Mislabeled usernames, (Wed, Aug 20th)
文章描述了通过Cowrie蜜罐收集的新用户名数据,发现攻击者常用此端口扫描Web服务器,并记录了许多HTTP请求头信息。其中"Airtel@123"被用作密码,而默认用户名可能是"admin"。作者指出该密码实际上是Wi-Fi默认密码,并列举了其他有趣的用户名和密码组合。 2025-8-20 15:27:19 Author: isc.sans.edu(查看原文) 阅读量:11 收藏

Looking at new usernames collected by our Cowrie honeypots, you will first of all notice a number of HTTP headers. It is very common for attackers to scan for web servers on ports that are covered by our Telnet honeypots. The result is that HTTP request headers end up in our username and password database. 

This morning, I noticed another interestingly looking username: Airtel@123 [1]. We do see it used with "passwords" like root, otx, and itmuser.

A quick Google search confirmed that "Airtel@123" is the password, and the username is likely "admin", which is not even in the list above. There is another odd thing the attacker may have overlooked here: Based on the documentation I could find, "Airtel@123" is not the telnet/ssh password for the Airtell Zerotouch router. Instead, it appears to be the Wifi default password. The login defaults to the less creative "admin"/"admin".

And while we are at it, here are a few more "interesting but useful" usernames and passwords I have seen:

'"username"' - Maybe someone parsing a random password list that was HTML encoded? Or someone trying to XSS our site?

echo 'Connection established' - no, it wasn't. Likely a check to see if the login succeeded.

'"root"' - even double quotes got escaped correctly. I still think this is more bad parsing of a username list, and not an XSS attack.

usernane "$oot" and password "$dmin". Interesting... No idea if that will work, but anybody got any ideas why someone may try this?

For a full list of recent usernames, see https://isc.sans.edu/data/allsshusernames.html. Let me know if you spot anything interesting.

[1] https://isc.sans.edu/ssh_usernames.html?username=QWlydGVsQDEyMw%3D%3D

--
Johannes B. Ullrich, Ph.D. , Dean of Research, SANS.edu
Twitter|


文章来源: https://isc.sans.edu/diary/rss/32216
如有侵权请联系:admin#unsafe.sh