<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Honeypot on Corvus Blog</title><link>https://nicoleman0.github.io/blog-site/tags/honeypot/</link><description>Recent content in Honeypot on Corvus Blog</description><generator>Hugo</generator><language>en-us</language><lastBuildDate>Wed, 28 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="https://nicoleman0.github.io/blog-site/tags/honeypot/index.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2017-17215</title><link>https://nicoleman0.github.io/blog-site/posts/iot_exploit_blog_post/</link><pubDate>Wed, 28 Jan 2026 00:00:00 +0000</pubDate><guid>https://nicoleman0.github.io/blog-site/posts/iot_exploit_blog_post/</guid><description>&lt;h2 id="attack-summary">Attack Summary&lt;/h2>
&lt;p>On January 28, 2026 at 21:01:11 UTC, IP address 60[.]19[.]220[.]0 attempted to exploit my ICS honeypot with CVE-2017-17215, a remote code execution vulnerability in Huawei HG532 routers. The attack targeted &lt;code>/boaform/admin/formLogin&lt;/code> with default credentials (&lt;code>username=user&amp;amp;psd=user&lt;/code>) via HTTP/1.0.&lt;/p>
&lt;p>The IP has two recent reports on AbuseIPDB, indicating active malicious scanning.&lt;/p>
&lt;h2 id="cve-2017-17215">CVE-2017-17215&lt;/h2>
&lt;p>CVE-2017-17215 is a remote code execution flaw in Huawei HG532 home gateways discovered in November 2017. The vulnerability exists in the router&amp;rsquo;s UPnP implementation, where the TR-064 protocol (designed for local network configuration) was exposed to the WAN through port 37215&lt;sup id="fnref:1">&lt;a href="#fn:1" class="footnote-ref" role="doc-noteref">1&lt;/a>&lt;/sup>.&lt;/p></description></item><item><title>Conpot Honeypot: First Day Attack Analysis</title><link>https://nicoleman0.github.io/blog-site/posts/conpot-first-day-report/</link><pubDate>Tue, 27 Jan 2026 00:00:00 +0000</pubDate><guid>https://nicoleman0.github.io/blog-site/posts/conpot-first-day-report/</guid><description>&lt;h1 id="conpot-honeypot-first-day-attack-analysis">Conpot Honeypot: First Day Attack Analysis&lt;/h1>
&lt;p>Within the first 6 hours of operation, my Conpot ICS honeypot (emulating a Siemens S7-1200 PLC) attracted &lt;strong>40+ distinct attack sessions&lt;/strong> from &lt;strong>30+ unique IP addresses&lt;/strong> across multiple continents. The attacks ranged from automated scanning to targeted industrial protocol exploitation, including the first documented &lt;strong>S7comm diagnostic probe&lt;/strong> and a sustained &lt;strong>Next.js remote code execution campaign&lt;/strong>.&lt;/p>
&lt;p>This post analyzes the attack patterns observed, identifies gaps in the honeypot configuration, and extracts actionable threat intelligence for ICS security research.&lt;/p></description></item><item><title>Customizing Conpot for Realistic ICS Emulation</title><link>https://nicoleman0.github.io/blog-site/posts/conpot-customization-blog-post/</link><pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate><guid>https://nicoleman0.github.io/blog-site/posts/conpot-customization-blog-post/</guid><description>&lt;h2 id="the-problem-with-default-templates">The Problem with Default Templates&lt;/h2>
&lt;p>Conpot&amp;rsquo;s default template emulates an S7-200 PLC with whimsical configuration values clearly designed for demonstration purposes rather than realism. Examining the default &lt;code>template.xml&lt;/code> reveals:&lt;/p>
&lt;div class="highlight">&lt;div style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">
&lt;table style="border-spacing:0;padding:0;margin:0;border:0;">&lt;tr>&lt;td style="vertical-align:top;padding:0;margin:0;border:0;">
&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 1
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 2
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 3
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 4
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 5
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 6
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 7
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 8
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f"> 9
&lt;/span>&lt;span style="white-space:pre;-webkit-user-select:none;user-select:none;margin-right:0.4em;padding:0 0.4em 0 0.4em;color:#7f7f7f">10
&lt;/span>&lt;/code>&lt;/pre>&lt;/td>
&lt;td style="vertical-align:top;padding:0;margin:0;border:0;;width:100%">
&lt;pre tabindex="0" style="color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;">&lt;code class="language-xml" data-lang="xml">&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;entity&lt;/span> &lt;span style="color:#a6e22e">name=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;unit&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>S7-200&lt;span style="color:#f92672">&amp;lt;/entity&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;key&lt;/span> &lt;span style="color:#a6e22e">name=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;FacilityName&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#f92672">&amp;lt;value&lt;/span> &lt;span style="color:#a6e22e">type=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;value&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>&amp;#34;Mouser Factory&amp;#34;&lt;span style="color:#f92672">&amp;lt;/value&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;/key&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;key&lt;/span> &lt;span style="color:#a6e22e">name=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;SystemName&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#f92672">&amp;lt;value&lt;/span> &lt;span style="color:#a6e22e">type=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;value&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>&amp;#34;Technodrome&amp;#34;&lt;span style="color:#f92672">&amp;lt;/value&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;/key&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;key&lt;/span> &lt;span style="color:#a6e22e">name=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;sysLocation&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span> &lt;span style="color:#f92672">&amp;lt;value&lt;/span> &lt;span style="color:#a6e22e">type=&lt;/span>&lt;span style="color:#e6db74">&amp;#34;value&amp;#34;&lt;/span>&lt;span style="color:#f92672">&amp;gt;&lt;/span>&amp;#34;Venus&amp;#34;&lt;span style="color:#f92672">&amp;lt;/value&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;span style="display:flex;">&lt;span>&lt;span style="color:#f92672">&amp;lt;/key&amp;gt;&lt;/span>
&lt;/span>&lt;/span>&lt;/code>&lt;/pre>&lt;/td>&lt;/tr>&lt;/table>
&lt;/div>
&lt;/div>&lt;p>While functional for basic honeypot deployment, these values present several issues for research purposes:&lt;/p></description></item><item><title>Deploying an ICS Honeypot</title><link>https://nicoleman0.github.io/blog-site/posts/conpot-deployment-blogpost/</link><pubDate>Mon, 26 Jan 2026 00:00:00 +0000</pubDate><guid>https://nicoleman0.github.io/blog-site/posts/conpot-deployment-blogpost/</guid><description>&lt;p>As part of my MSc research in Information Security at Royal Holloway, University of London, I&amp;rsquo;ve been investigating the threat landscape facing industrial control systems (ICS) and SCADA infrastructure. One of the most effective ways to understand attacker behavior in this space is through honeypot deployment; specifically, using Conpot to emulate vulnerable industrial systems.&lt;/p>
&lt;p>This post documents my process of deploying a production ICS honeypot on DigitalOcean, the technical considerations involved, and some initial observations from the deployment.&lt;/p></description></item></channel></rss>