Honeypot Processors: Basic Authentication Processor
The basic authentication processor is responsible for emulating a vulnerable authentication mechanism in the web application. This is done by publicly exposing fake server configuration files (.htaccess and .htpasswd) that appear to be protecting a resource with basic authentication (a part of the HTTP protocol). To the attacker, the site will appear to be exposing a sensitive administrative script on the site, with weak password protection. As the malicious user identifies the availability of such publicly exposed files, they are walked through a series of steps that emulate exposing an additional piece of information. As the final step, if they end up breaking the weakly authenticated password, they will be considered a high threat.
![]() | Note: This processor should only be used when the site is using Apache as front end webservers due to particular files involved (.htaccess and .htpasswd) being specific to Apache webserver.) |
![]() | Note: Browsers often ignore the body content of HTTP responses if the status code is anything other than 200. For best compatibility with different browser versions, you might want to use a 200 status code when uploading responses such as images or executable code. |
Table 14: Basic Authentication Processor Configuration Parameters
Parameter | Type | Default Value | Description |
---|---|---|---|
Basic | Whether traffic should be passed through this processor. | ||
Processor Enabled | Boolean | True | |
Advanced | |||
Authorized Users | Collection | Collection | A list of authorized user accounts. |
Protected Resource URL | String | [random resource] | The fake protected resource. |
Protected Resource Response Status | String | [random status] | The HTTP status to return when accessing the resource. |
Randomization Salt | String | Random | A random set of characters used to salt the generation of code. Any value is fine here. |
Incident: Password Cracked | Boolean | True | The user has successfully accessed a fake protected resource using a cracked username and password. |
Incident: Apache Configuration Requested | Boolean | True | The user has requested the apache directory configuration file .htaccess. |
Incident: Apache Password File Requested | Boolean | True | The user has requested the apache password file .htpasswd |
Incident: Invalid Credentials | Boolean | True | The user has attempted to login to access the fake file protected by basic authentication, but failed. |
Incident: Protected Resource Requested | Boolean | True | The user has requested a fake file which is protected by basic authentication. |