HoneyPots - WordPress.com

advertisement
Honeypots
An additional layer of security
By Gary Madzudzo
What are Honeypot?
What are Honeypots
 A security resource who’s value lies in the
unauthorized or malicious interaction with it.
 A deception trap, designed to entice an attacker into
attempting to compromise an organization's
information system.
What are Honeypots?
 More generally a honeypot is a trap set to deflect or
detect attempts at unauthorized use of information
systems.
 Used for monitoring, detecting and analyzing attacks.
 Early warning and advanced security surveillance tool.
 Does not solve a specific problem. Instead, they are a
highly flexible tool with different applications to
security.
Their Value
 Primary value of honeypots is to collect information.
 This information is then used to better identify,
understand and protect against threats.
 Honeypots add little direct value to protecting your
network.
Why Honeypots
Security personnel and the IT industry depend on honeypots
 Honey pots are used to:






Build anti-virus signature
Build SPAM signatures and filters
Identify compromised systems
Assist law-enforcement to track criminals
Hunt and shutdown botnets
Malware collection and analysis
Problems
 Internet security is hard
 New attacks every day.
 Our computers are static targets.
 What should we do?
 The more you know about your enemy, the better
you can protect yourself.
 Fake target?
Uses of Honeypots
 Preventing attacks
 Automated attacks (e.g. worm)
 Attackers randomly scan entire network and find vulnerable systems
 Sticky honeypots, monitor unused IP spaces and slow down the attacker
when probed
 Used a variety of TCP tricks, such as using a zero window size
 Human attacks
 Use deception/deterrence
 Confuse the attackers, making them waste their time and resources
 If the attacker knows your network has honeypot, he may not attack
the network
Uses of Honeypots
 Detecting attacks
 Traditional IDS’s generate too much logs, large percentage
of false positives and false negatives.
 Honeypots generate small data, reduce both false positives
and false negatives.
 Traditional IDS’s fail to detect new kinds of attacks,
honeypots can detect new attacks.
 Traditional IDS’s may be ineffective in an IPv6 or encrypted
environment.
Uses of Honeypots
 Responding to attacks
 Responding to a failure/attack requires in-depth
information about the attacker.
 If a production system is hacked (e.g. mail server) it can’t
be brought offline for analysis.
 Besides, there may be too much data to analyse, which
will be difficult and time-consuming.
 Honeypots can be easily brought offline for analysis.
 Besides, the only information captured by the honeypot
is related to the attack, therefore easy to analyse.
Types
 Honeypots come in two flavors:
 Low-interaction
 High-interaction
 Interaction measures the amount of activity that an
intruder may have with a honeypot.
Some Honeypot Examples






Nepenthes
Honeyd
Honeytrap
Web Applications
KFSensor
Backofficer friendly
Classification
 By level of interaction
 High
 Low
 By Implementation
 Virtual
 Physical
 By purpose
 Production
 Research
By Classification - Production
 A production honeypot is used for risk mitigation.
 Most production honeypots are emulations of specific
operating systems or services.
 Help to protect a network and systems against attacks
generated by automated tools used to randomly look
for and take over vulnerable systems.
By Classification - Research
 Real operating systems and services that attackers can
interact with.
 Collect extensive information and intelligence on new
attack techniques and methods.
 Provide a more accurate picture of the types of attacks
being perpetrated.
 Provide improved attack prevention, detection and
reaction information.
Level of Interaction
Low
Fake Daemon
Medium
Operating system
Disk
High
Other local
resource
By Classification – Low level
Interaction
 Also known as GEN-I honeypot
 Beginner level attacks
 Simulates some aspects of the system
 Easy to deploy, minimal risk
 Limited Information
Low Interaction Server
 Software that emulates a functionality, services,
applications and OS’s.
 Easier to deploy and automate, less risk, but
customized to more specific attacks.
 Capture limited information: attackers’ activities are
contained to what the emulated system allows.
Low Interaction - Honeyd
 Honeyd: A virtual honeypot application, which allows us to
create thousands of IP addresses with virtual machines and
corresponding network services.
 It’s a GEN-I honeypot which emulates services and their
responses for typical network functions from a single
machine.
 Making the intruder believe that there are numerous different
operating systems.
 Monitors unused IP space.
 Can monitor literally millions of IP addresses at the same time.
Honeyd monitoring unused IPs
By Classification – High level
Interaction
 A high-interaction honeypot consists of : resource of
interest, data control, data capture and external logs.
 More complex to deploy and maintain in comparison to
low-interaction honeypots.
 Very useful in their ability to identify vulnerable services
and applications for a particular target operating
system.
High Interaction Server
 Typically real applications on real systems. Much
more manual work, but more flexible in the data and
threats it can capture.
 Real services, applications and OS’s.
 Capture extensive information, but high risk and time
intensive to maintain.
 Can capture new, unknown or unexpected behaviour.
High Level - Honeynet
Honeynet - two or more honeypots on a network form a
honeynet.
 Design to capture in-depth information.
 Its an architecture populated with live systems.
 Used for monitoring and/or more diverse network in which
one honeypot may not be sufficient.
 Honeynets (and honeypots) are usually implemented as parts
of larger network intrusion-detection systems.
 Their primary value lies in research, gaining information on
threats.
Gen II Honeynet
Client Based Honeypots
Threats change, and so to do the technologies. Bad
guys have moved to client based attacks, they let the
victims come to them.
 Capture-HPC (high interaction)
 HoneyC (low interaction)
 Microsoft Strider Honeymonkey
Wireless Honeypots
Wireless Honeypots
Fake AP
 A script that emits spoofed probe responses into the
air in an effort to mislead any war drivers.
 The script is tied into the wireless card and dynamically
changes the SSID, MAC address, channel, signal
strength to make it looks like numerous wireless
networks are operating in the area.
 This technique is not useful for more skilled hackers
who can recognised the method and focus on the valid
network.
Wireless Honeypots
 The wireless honeypot takes the non-interactive fake AP
and creates a seemingly valid environment that looks and
acts like a real wireless networks. This gives hackers
nothing but practice.
 Such honeypots includes APs, emulated client traffic,
monitors for data collection and maybe a valid
infrastructure if he honeypot owner needs to collect data
on deeper penetration techniques.
Building a Honeypot
 To build a honeypot, a set of Virtual Machines are
created.
 They are then setup on a private network with the
host operating system.
 To facilitate data control, a stateful firewall such as IP
Tables can be used to log connections.
 The final step is data capture, for which tools such as
Sebek and Term Log can be used.
 Analysis on the data can be performed using tools
such as Honey Inspector, PrivMsg and SleuthKi.
Deployment
 Install honeypots alongside regular production servers The honeypot will likely need to mirror some real data and
services from the production servers in order to attract
attackers.
 Pair each server with a honeypot, and direct suspicious
traffic destined for the server to the honeypot.
 Build a honeynet, which is a network of honeypots that
imitate and replicate an actual or fictitious network.
Advantages of using Honeypots
 Collect small amounts of information that have great value
and easier to analyse.
 Capture any activity and can work in encrypted networks.
 Can lure the intruders very easily.
 Are relatively simple to create and maintain.
 Work with IPv6.
 Can be used in a variety of environments.
 Reduce false positives and negatives.
 Require minimal resources.
Disadvantages of using Honeypots






Add complexity to the network.
Have limited field of view.
Only see what interacts with them.
There is also a level of risk to consider.
Can’t be used to detect attacks on other systems.
Attacker may take over the honeypot and use it to
attack other systems.
 It is an expensive resource for some corporations.
Conclusion
 Honeypots are positioned to become a key tool to defend
corporate enterprises from hacker attacks.
 Honeypots are not a solution, they are a flexible tool with
different applications to security.
 Although honeypots have legal issues now, they do
provide beneficial information regarding the security of a
network.
 This will help to solve current challenges and make it
possible to use honeypots for the benefit of the broader
internet community.
Summary Video
http://www.youtube.com/watch?v=76iHn5MH2IY
Download