Common usernames submitted to honeypots (2024)

Published: 2023-09-05. Last Updated: 2023-09-05 01:43:10 UTC
by Jesse La Grew (Version: 1)

Based on reader feedback, I decided to take alook at usernames submitted to honeypots. The usernames that are seen on a daily basis look very familiar.They tend to come from default user accounts, such as "administrator" on Windows systems or"root" on Linux systems. The knowledge of a default user account can help in brute force attacks. If the username is already known, onlythe password needs to be guessed. This shouldn't be too much of a problem to users as long as strong passwords are chosenor other authentication methods such aspublic key authentication is used. Setting up public key authentication is also referenced in our DShield setup instructions for a Raspberry Pi [2].

I exported the username data from my honeypot, which isa little over 16 months of data, using JQ.

# output data from all local cowrie logs# cat /logs/cowrie.json.* ## select data with the username key present# jq 'select(.username)' ## output raw username vales (without quotes) and store in a text file# jq -r .username > 2023-09-04_all_usernames_raw.txtcat /logs/cowrie.json.* | jq 'select(.username)' | jq -r .username > 2023-09-04_all_usernames_raw.txt

Total number of usernames submitted:3,668,336
Number of unique passwords submitted:105,022 (2.86% of passwords submitted were unique)

The most common username, "root", accounted for almost 50% of the total username submissions. This is not surprising since SSH is a common attack protocol that thehoneypots collect this data from andis commonly used in Linux systems. This may change over time as newer Windows operating systems whichinclude SSH options,become more common [3].

UsernameCountPercentage
root1,778,93848.49%
admin137,9713.76%
user58,9421.61%
test48,0861.31%
ubuntu44,2301.21%
345gs5662d3436,4730.99%
nproc33,2690.91%
postgres17,7000.48%
oracle17,3840.47%
ftpuser13,4040.37%
TOTAL2,186,39759.60%

Figure 1: Top 10 usernames submitted to my honeypot and overall counts

Almost 60% of all usernames come from the top 10 list. Let's take a look at some of the most frequently used passwords for some of these usernames. This data can also be extracted with JQ.

# output all cowrie data in /logs directory# cat /logs/cowrie.json.*## select all data with the username of "root"# jq 'select(.username=="root")'## output raw password data (no quotes)# jq -r .password## sort data alphabetically# sort## give unique password values with frequency counts# uniq -c## sort data by frequency count, reverse sorted (descending, most frequent hits on top)# and save results to text file# sort -rn > passwords_submitted_with_root_user_count.txtcat /logs/cowrie.json.* | jq 'select(.username=="root")' | jq -r .password | sort | uniq -c | sort -rn > passwords_submitted_with_root_user_count.txt

Common usernames submitted to honeypots (1)
Figure 2: Honeypot passwords associated with most common usernames

In the honeypot data, there are some deviations with the most common passwords used. The most commonly submitted password with the "root" user account was noted in my previous diary [4]. This also highlights another unusual finding with a username of the same value ("345gs5662d34"). This username only has one password associated with it, unlike the other top findings. If you know something about this particular value, please add a comment.

It's very common to see the login for a new device or service to have a default password that is the same as the built-in default user account. Attacking these default values can be very successful if users do not change the default password. Also, if a device is reset during troubleshooting, these default credentials may not be addressed after the reset.

Common usernames submitted to honeypots (2)
Figure 3: 20 Most frequently used usernames for one honeypot overthe last 16 months

The most commonly submitted usernames and passwords with the same values can also be easily retrieved with JQ.

# read json logs in /logs directory# cat /logs/cowrie.json.*## select values with the username key present# jq 'select(.username)'## select data where the values in the username and password keys are equal# jq 'select(.username==.password)'## select and output username and password values in CSV format# jq -r '[.username, .password] | @csv'## sort data alphabetically# sort ## display unique values with the number of instances of the value# uniq -c## sort the data by number of instances, reverse sorted (descending order)## sort -nr## display the first 30 items# head -n 30cat /logs/cowrie.json.* | jq 'select(.username)' | jq 'select(.username==.password)' | \jq -r '[.username, .password] | @csv' | sort | uniq -c | sort -nr | head -n 30

Common usernames submitted to honeypots (3)
Figure 4: 30 most commonly seen matching username and psasword values from honeypot

Make sure to use unique passwords and when possible, avoid using the default account with your device or service [5]. If possible, disable that account and when it's not possible, set a very strong password with limited rights.

[1]https://community.ui.com/questions/user-name-and-password/68e13798-d7b8-41e2-9e8e-cec3d92b0c4e
[2]https://isc.sans.edu/honeypotinstall.pdf
[3]https://learn.microsoft.com/en-us/windows-server/administration/openssh/openssh_install_firstuse?tabs=gui
[4]https://isc.sans.edu/diary/What+is+the+origin+of+passwords+submitted+to+honeypots/30182/
[5]https://www.raspberrypi.com/news/raspberry-pi-bullseye-update-april-2022/

--
Jesse La Grew
Handler

Common usernames submitted to honeypots (2024)
Top Articles
What is a ping and how does it work?
How credit cards work - Canada.ca
Ups Stores Near
Tmf Saul's Investing Discussions
7 Verification of Employment Letter Templates - HR University
Quick Pickling 101
Craigslist Vans
Nyu Paralegal Program
Toyota Campers For Sale Craigslist
라이키 유출
U.S. Nuclear Weapons Complex: Y-12 and Oak Ridge National Laboratory…
Taylor Swift Seating Chart Nashville
Mens Standard 7 Inch Printed Chappy Swim Trunks, Sardines Peachy
4156303136
Hair Love Salon Bradley Beach
Drago Funeral Home & Cremation Services Obituaries
Clear Fork Progress Book
Georgia Vehicle Registration Fees Calculator
Spider-Man: Across The Spider-Verse Showtimes Near Marcus Bay Park Cinema
Royal Cuts Kentlands
ZURU - XSHOT - Insanity Mad Mega Barrel - Speelgoedblaster - Met 72 pijltjes | bol
Ruse For Crashing Family Reunions Crossword
Selfservice Bright Lending
Doublelist Paducah Ky
Who is Jenny Popach? Everything to Know About The Girl Who Allegedly Broke Into the Hype House With Her Mom
683 Job Calls
Www.craigslist.com Austin Tx
Sandals Travel Agent Login
1 Filmy4Wap In
What Individuals Need to Know When Raising Money for a Charitable Cause
Craigslist Ludington Michigan
Pacman Video Guatemala
Motorcycle Blue Book Value Honda
Wolfwalkers 123Movies
Delta Math Login With Google
Jeep Cherokee For Sale By Owner Craigslist
Eaccess Kankakee
6143 N Fresno St
October 31St Weather
Frommer's Philadelphia & the Amish Country (2007) (Frommer's Complete) - PDF Free Download
Complete List of Orange County Cities + Map (2024) — Orange County Insiders | Tips for locals & visitors
Dcilottery Login
Unveiling Gali_gool Leaks: Discoveries And Insights
How to Connect Jabra Earbuds to an iPhone | Decortweaks
Vci Classified Paducah
Minterns German Shepherds
Verizon Forum Gac Family
Smoke From Street Outlaws Net Worth
Sam's Club Fountain Valley Gas Prices
Inside the Bestselling Medical Mystery 'Hidden Valley Road'
Saw X (2023) | Film, Trailer, Kritik
Latest Posts
Article information

Author: Eusebia Nader

Last Updated:

Views: 5866

Rating: 5 / 5 (80 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Eusebia Nader

Birthday: 1994-11-11

Address: Apt. 721 977 Ebert Meadows, Jereville, GA 73618-6603

Phone: +2316203969400

Job: International Farming Consultant

Hobby: Reading, Photography, Shooting, Singing, Magic, Kayaking, Mushroom hunting

Introduction: My name is Eusebia Nader, I am a encouraging, brainy, lively, nice, famous, healthy, clever person who loves writing and wants to share my knowledge and understanding with you.