A forum for reverse engineering, OS internals and malware analysis 

Forum for analysis and discussion about malware.
 #23514  by Websly
 Sun Aug 07, 2016 6:40 pm
Hello Kernelmode,

I'm setting up a honeypot system where all honeypots report to a central system.

The question I have is how to expose them to the most attacks by knowing how the attackers operate. At the moment I have a bunch of them in the same /21 public subnet. They are already getting a lot of attacks, but I want to try to get as many as possible.

1) Do attackers/infected pc's most often scan by Ip address or DNS name? In other words, will I need to register DNS records for them?
2) Do infected computers start scanning random addresses or start with IP's simular to their own public one? In other words, do I need to place my honeypots in different subnets around the world?

I understand having my first "contribution" to this forum be a question is a bit tasteless, but I'm still busy working down the list of 'interesting malware. Once I have RE'ed those I hope I can help with the newer samples.
 #28991  by Xylitol
 Tue Aug 09, 2016 11:08 am
>1) Do attackers/infected pc's most often scan
they scan by range/looks for vulnerable services or weak passwd, U.S IP should have success.

>2) Do infected computers start scanning random addresses
depend of what the guy does with the infected unit.