Archive
013
EXH-0132016Fictional reconstruction

admin / 12345

Fall 2016. DVRs and IP cameras ship with telnet open and passwords printed on a sticker nobody changed. Someone publishes src.zip and the internet learns a new verb: `load`.

Type
Defensive / IR
Difficulty
Intermediate
Era
2010s
Time
8 min

Briefing

You are not running Mirai, you are reading what your pots captured before your university pulled the RFC1918 ACL. Everything here is synthetic text matching public write-ups.

Your role

Graduate student maintaining telnet honeypots the week Mirai source dropped on a forum.

Objective

Prove from honeypot transcripts that infection is credential guessing, not an 0-day, and identify the loader phraseology.

Terminal environment

user
researcher
host
telnet-pot-07
cwd
/honeypot/mirai-era
steps
3
Enter the terminalAbout 8 minutesSafe simulation

Safety note. This is a safe reconstruction. All systems, files, hosts, credentials, and outputs are simulated. Do not use these techniques on systems you do not own or have explicit permission to test.