This file is indexed.

/etc/prelude-lml/ruleset/honeytrap.rules is in prelude-lml-rules 4.1.0-1.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
#FULLNAME: Honeytrap
#VERSION: 1.0
#DESCRIPTION: Honeytrap is a network security tool written to observe attacks against TCP or UDP services.

#####
#
# Copyright (C) 2007 Bjoern Weiland <bjoern-dot-weiland-at-web-dot-de>
# All Rights Reserved
#
# This file is part of the Prelude-LML program.
#
# This program is free software; you can redistribute it and/or modify
# it under the terms of the GNU General Public License as published by
# the Free Software Foundation; either version 2, or (at your option)
# any later version.
#
# This program is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
# GNU General Public License for more details.
#
# You should have received a copy of the GNU General Public License along
# with this program; if not, write to the Free Software Foundation, Inc.,
# 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
#
#####

#DESCRIPTION:Reconnaissance Probe
#CATEGORY:Honeypot
#LOG:[2007-05-26 16:48:09]  * 22       No bytes received from 157.100.50.58:57701.
 regex=\* (\d+)\s+No bytes received from (\S+):(\d+).; \
 classification.text=Reconnaissance Probe; \
 id=40000; \
 revision=1; \
 analyzer(0).name=Honeytrap; \
 analyzer(0).manufacturer=http://honeytrap.mwcollect.org; \
 analyzer(0).class=Honeypot; \
 source(0).node.address(0).address=$2; \
 source(0).service.port=$3; \
 target(0).service.port=$1; \
 #assessment.impact.completion=succeeded; \
 assessment.impact.type=recon; \
 assessment.impact.severity=low; \
 assessment.impact.description=A connection to honeytrap has been established, but no data was received.; \
 last

#DESCRIPTION:Attack attempt
#CATEGORY:Honeypot
#LOG:[2007-05-26 16:49:23]  * 22       724 bytes attack string from 157.100.50.58:47537.
 regex=\* (\d+)\s+(\d+) bytes attack string from (\S+):(\d+).; \
 classification.text=Attack attempt; \
 id=40001; \
 revision=1; \
 analyzer(0).name=Honeytrap; \
 analyzer(0).manufacturer=http://honeytrap.mwcollect.org; \
 analyzer(0).class=Honeypot; \
 source(0).node.address(0).address=$3; \
 source(0).service.port=$4; \
 target(0).service.port=$1; \
 assessment.impact.severity=medium; \
 assessment.impact.description=Attack string has been saved; \
 additional_data(0).type=integer; \
 additional_data(0).meaning=Attack string size; \
 additional_data(0).data=$2; \
 last

#DESCRIPTION:Attempt to download Malware
#CATEGORY:Honeypot
#LOG:[2007-05-26 17:14:30] FTP download - Requesting 'install_58181.exe' from 193.11.129.193:5836.
 regex=(\S*) download - Requesting '(.*)' from (\S+):(\d+).; \
 classification.text=Malware download attempt; \
 id=40002; \
 revision=1; \
 analyzer(0).name=Honeytrap; \
 analyzer(0).manufacturer=http://honeytrap.mwcollect.org; \
 analyzer(0).class=Honeypot; \
 source(0).node.address(0).address=$3; \
 source(0).service.port=$4; \
 #target(0).file(0).name=$2; \
 assessment.impact.type=file; \
 assessment.impact.severity=high; \
 assessment.impact.description=Trying to download Malware via $1; \
 additional_data(0).type=string; \
 additional_data(0).meaning=Filename; \
 additional_data(0).data=$2; \
 last