mushorg / conpot

ICS/SCADA honeypot
GNU General Public License v2.0
1.24k stars 415 forks source link

Testing conpot default template #430

Closed Hadi-94 closed 5 years ago

Hadi-94 commented 5 years ago

I've installed Conpot (The default template) and set it up using "virtualenv" documentation that is available. I want to test it to check if it is actually working and detecting attacks from a different computer on the same network. I've already tested it using nmap (for checking http and ftp ports), but I'm more interested in Modbus and S7comm protocols. Since I'm still new at this can anyone help me out in suggesting some tools that can help ? Thanks in advance..

10rule commented 5 years ago

Modbus and S7 both have nmap scripts

https://nmap.org/nsedoc/scripts/modbus-discover.html https://nmap.org/nsedoc/scripts/s7-info.html

Hadi-94 commented 5 years ago

There is an issue every time I run the nmap code with the script provided for s7-comm, the outpot script doesn't look like how it should be.

First I ran the script against port 102 and i got this result: https://imgur.com/a/t8tdhcz

Second, I ran it against port 1020 and I got this result: https://imgur.com/a/aXpx7GI

there was no details about the s7-comm in the nmap script output, and the status if the port was ‘closed’. In addition the Honeypot didn't detect the attack at all, as if it never happened. Keeping in mind the same issue happen to modbus script. There was no details of the slaves, and the conpot didn't log in the reaction that happens.

Hadi-94 commented 5 years ago

Update on this issue: I've found out that Conpot stopped using ports <=1024, and sometimes the port numbers were entered wrong. However, the issue of not having the same expected results still remains, and I think if i tried to bind Conpot using authbind as it was suggested in one of the issues before it might help in getting information from S7comm protocol and Modbus Protocol.