CHAPTER 15 Honeypots Taking the Offensive in Network Security Turner, Michael P. Image of Honeypot by Mark Fruhwirth The purpose of this paper is to inform any interested party about the basics of honeypots and honeynets. The information used in this paper is comprised of research gathered by me from various sources which are cited below. Most of the content written in this paper is paraphrased or taken directly from these cited sources. What are Honeypots? In modern times, security of digital information is a major concern. Most strategies for security are defensive strategies but the approach to a deceptive and almost offensive strategy is increasing. This strategy that is steadily becoming more popular is the use of a decoy based system called a honeypot. So what are Honeypots? According to Honeypots.net, “honeypots are closely monitored network decoys serving several purposes: they can distract adversaries from more valuable machines on a network, they can provide early warning about new attacks and exploitation trends and they allow indepth examination of adversaries during and after exploitation of a honeypot.” (honeypots.net) The truth is that most people don’t believe or even know that their machines are targets for cyber attackers. They don’t realize that there are many people out there trying to access their machines and think the odds of their machine being compromised are nil. Unfortunately there are people out there everywhere that are deliberately cracking into systems every day and eventually most systems will have had someone try and gain unauthorized access to it; basically, everyone is a target. Even though we’d like to believe that these people don’t exist, they do and the worth of a honeypot strictly depends on these people interacting with it. Honeypots can be a sweet and enticing trap to people of this nature. Basically, honeypots are mock information servers deliberately positioned in a test network, which are fed with false information disguised as files of a classified nature. In turn, servers are initially configured in a way that is complicated but definitely possible to break into by an attacker; exposing them deliberately and making them highly attractive for a hacker in search of a target. (Spitzner, Honeypots: Tracking Hackers, 2003) Figure 15.1 - Image of a network with honeypots (Information Technology Specialty) The main functions of Honeypots are as follows (Hernandez y Lopez & Resendez): - “To divert the attention of the attacker from the real network, in a way that the main information resources are not comprised - To capture new viruses or worms for future study - To build attacker profiles in order to identify their preferred attack methods, similar to criminal profiles used by law enforcement agencies in order to identify a criminal’s modus operandi. - To identify new vulnerabilities and risks of various operating systems, environments and programs which are not thoroughly identified at the moment” Levels of Interaction There are typically 3 levels of interaction for honeypots: low, medium and high interaction honeypots. These levels of interaction give us a scale to measure and compare them by. Some honeypots emulate few services such as FTP or Telnet and some honeypots are actual systems with a complete operating system and full applications. Below is a table that demonstrates the tradeoffs between the level of interaction, the workload necessary to maintain the honeypot and level of risk. Level of Interaction Work to Work to Information Install and Deploy and Gathering Configure Maintain Low Easy Easy Limited Medium Involved Involved Variable High Difficult Difficult Extensive Table 15.1 - (Spitzner, Honeypots: Tracking Hackers, 2003) Level of Risk Low Medium High As you can see, low interaction honeypots are easy to configure and take care of but they gather only limited information. High interaction honeypots are difficult to configure and maintain but they gather vast amounts of information pertaining to the attacker. Low interaction Honeypots Low interaction honeypots are the easiest to install. They usually emulate an operating system’s services, limiting the attacker’s activities. Simplicity is the key factor when deciding to use this type of honeypot because they are easy to use and easy to maintain. Another advantage is that there is minimal risk with this type of honeypot. (Hernandez y Lopez & Resendez) The reason these honeypots are called low interaction is because the attacker can only do so much when attempting to compromise this type of honeypot. An example of a low interaction honeypot is an attacker tries to Telnet into the honeypot; he/she gets a banner stating the operating system and even possibly obtains a login prompt. The attacker can then attempt to login by guessing the password, using a brute force password cracker or using whatever method desired. The honeypot captures and collects the login attempts but there is no actual operating system for the attacker to log on to. This limits the attacker to strictly login attempts and there is nothing more that the attacker can do. This also means that the data collected from the honeypot is limited to detection of unauthorized scan attempts and connections by an attacker. (Spitzner, Honeypots: Tracking Hackers, 2003) Although the emulated services of a low interaction honeypot only gather limited information there is an advantage to the attacker’s restricted activity; it alleviates the risk of the attacker accessing an actual operating system and using that as a platform to attack and harm others. A disadvantage is that a skilled attacker may become privy to the false system, realizing what it actually is. (Spitzner, Honeypots: Definitions and Value of Honeypots) These types of honeypots are often used as production honeypots or honeypots used as a decoy to sort of lure an attacker away from an organization’s actual systems. Honeyd or Specter may be considered examples of low interaction honeypot software. Medium Interaction Honeypots Medium interaction honeypots offer attackers more ability to interact than do low interaction honeypots but less functionality than high interaction solutions (Spitzner, Honeypots: Tracking Hackers, 2003). “A medium-interaction honeypot will more fully implement the HTTP protocol to imitate a wellknown vendor's implementation, such as Apache” (Peter & Schiller). Much like the low interaction honeypot, this type of honeypot usually only provides a restricted operation of services and there is no actual operating system for the attacker to compromise. In some cases a medium interaction honeypot is used as a jail or chroot. “A chroot (jail) is a UNIX feature that creates a limited sandbox allowing a process to view only a single subtree of the filesystem” (Haas). By creating a virtual OS, this allows an administrator to partition an operating system environment within a real operating system. Although the virtual OS is controlled by the actual operating system it gives the look and atmosphere of a legitimate operating system. This allows for the security admin to heavily monitor and control the attacker’s activities from the master OS. (Spitzner, Honeypots: Tracking Hackers, 2003) Mid interaction level honeypots, although similar to low interaction ones, are more time consuming to install and configure because they involve a high level of customization and development. More modifications are needed in order to emulate a system such as a web server and usually these types of honeypots are not prepackaged commercial products. (Spitzner, Honeypots: Tracking Hackers, 2003) Nepenthes may be considered a version of low - medium interaction level honeypot software. High Interaction Honeypots These honeypots are much more complex than the other two because they consist of using an actual machine instead of using software that emulates services. “For example, if a Honeypot needs to be implemented on a real Linux system running an FTP server, a real Linux system needs to be built on a real computer and a real FTP server will need to be configured.” (Hernandez y Lopez & Resendez) A standard build for a high interaction honeypot is no different than a production honeypot used in an organization. Basically, the one thing that separates them from a production system is that the value in these machines relies on them being probed, attacked or compromised (Spitzner, Honeypots: Tracking Hackers, 2003). Although there is no data of significance, the risk is high with high interaction honeypots because once they are compromised an attacker can still use it as a platform to attack other machines. This requires much more work and involvement from a system admin to alleviate any risks. These types of honeypots require the assistance of other defensive technologies such as firewalls and IDS’s, intrusion detection systems. High interaction honeypots are usually placed within a controlled environment behind a firewall or in more modern versions of honeypots, a honeywall. A honeywall is basically a gateway to and from a honeynet, “but it is also a firewall, an IPS (Intrusion Prevention System), and a network traffic/system logger” (Diego, 2004). All traffic entering or leaving the honeynet must go through this honeywall (Spitzner, Know Your Enemy: GenII Honeynets, last modified - 2005). The ability to control and limit the attacker would come from a network access control device such as the honeywall itself and not from the honeypot. The firewall or honeywall would be used to let the attacker compromise the system but not let him/her launch attacks back out which makes it complicated to deploy and maintain. (Spitzner, Honeypots: Tracking Hackers, 2003) With the attacker being allowed access to an actual system and having so much freedom inside the system the risk is extremely high. Lots of dedicated work goes into deploying and maintaining these types of honeypots requiring constant attention and monitoring of the system. The advantage of giving the intruder so much freedom is that the amount of information gathered from the attack is extensive. One can observe every action taken by the attacker such as what kind of information they are looking for, what exploits they used to compromise the system, their every keystroke, where the attack came from and when, information on the skill level and behavior of the intruder, etc. The amount of information gathered is often worth the risk. These types of honeypots are most often used as research honeypots. Why are Honeypots Important? The first actual documented case of a honeypot being used to capture a previously unknown exploit happened on January 8, 2002 by a Solaris honeypot. Solaris is a UNIX operating system originally developed by Sun Microsystems. This Solaris honeypot captured a dtspcd exploit, an attack that had never been seen before. Dtspcd, or the CDE Sub-process Control Service, was a known vulnerable process among the security community but there was no known exploit for it, or so it was assumed. Apparently in the Blackhat Community, a community of unethical cyber attackers, there was an exploit and it was found when someone used it to gain remote access to this Solaris honeypot. Based upon the information gathered from the honeypot, the Computer Emergency Readiness Team (CERT) was able to release a warning to the security community. This validates the importance of honeypots, not only catching already known attacks like worms but also catching and exposing unknown cyber assaults. (Spitzner, Honeypots: Tracking Hackers, 2003) Everyone has an idea of what a honeypot is. Some believe it is a deception tool, some believe its purpose is to lure intruders, and some think it’s some sort of IDS. The example in the paragraph above is just one of the many useful things honeypots can be used for. Most systems like a firewall or an IDS (Intrusion Detection System) have one main purpose. A firewall blocks unauthorized network traffic and an IDS detects unauthorized access. Honeypots are different in that they aren’t used to solve a single specific problem. Like firewalls, honeypots can be used to deter attacks; like an IDS, they can be used to detect attacks; they can be used to capture and analyze automated attacks like worms or act like early warning sensors; and they also give you the ability to research the blackhat community by capturing keystrokes and conversations of attackers. A honeypot is a tool that contributes to the overall security architecture and depending how you build it, can be used for a variety of different reasons. (Spitzner, Honeypots: Tracking Hackers, 2003) Production Honeypots and Research Honeypots The type of honeypot you are using has very much to do with the reasoning behind deploying it. Honeypots are mainly deployed as 2 different types; production honeypots and research honeypots. A honeypot used more as a decoy with minimal functionality and a low interaction level would be deployed as a production honeypot, whereas a honeypot made from an actual operating system used to gain information about an attacker and their behavior with a high interaction level would most likely be deployed for research. Production Honeypots This is the most common type of honeypot. Companies, businesses and institutions use honeypots in this way to protect themselves from being attacked by luring the attacker elsewhere. Production Honeypots don’t require as much functionality as research honeypots and are easier to build and deploy. (Iyatiti Mokube, Honeypots: Concepts, Approaches and Challenges) Also because they have less functionality, they also give less information about the intruder who enters the honeypot. These types of honeypots usually reflect the image of a company’s actual servers or workstations and so help organizations to become aware of current vulnerabilities in their actual systems. This allows the network admins of an organization to patch up any holes before they are exploited and build up a better defense against future attacks. Figure 15.2 - Image of a Production Honeypot (Grimes) Research Honeypots These types of honeypots are not intended to assist in protecting networks, but more so used by organizations such as: universities, governments, the military or large corporations interested in learning more about threats research, to study attack patterns and the behavior of crackers in the blackhat community. These types of honeypots capture extensive amounts of data and are complex to both deploy and maintain (Iyatit Mokube, Honeypots: Concepts…). By logging and gathering information as the attacker invades a research honeypot researchers are able to study what tools and methods they use to gain access, understand their logic and reasoning for breaking in, and track patterns for the purpose of helping network admins strengthen network security. Most research honeypots consist of multiple honeypots called a honeynet. These multiple honeypots are created for the purpose of imitating an entire production system. Figure 15.3 - Image of a Honeynet (HoneyNet Research Project) Here’s a link to a compromised honeypot with analysis. - http://www.packetfu.org/hpa.html What are Honeynets? A honeynet is a network of one or more high interaction honeypots, imitating an actual network of production systems, which are heavily monitored and used as bait for crackers. (Spitzner, Know Your Enemy: Honeynets, Last modified - 2006) These honeynets are used mainly for research in order to learn about new attacks and intruder behavior. “In many ways a honeynet is like a fishbowl. You create an environment where you can watch everything happening inside it. However, instead of putting rocks, coral, and sea weed in your fish bowl, you put Linux DNS servers, HP printers, and Juniper routers in your honeynet architecture. Just as a fish interacts with the elements in your fishbowl, intruders interact with your honeypots.” (Spitzner, Know Your Enemy: Honeynets, Last modified - 2006) Honeynet Project A lot of attention is focused on the research honeypots and honeynets. One example is the Honeynet project. The Honeynet Project is a “non-profit security research organization dedicated to investigating attacks and developing open source security tools to improve Internet security.” There are volunteers who have created chapters all around the world helping to fight against blackhats by “discovering new attacks; creating tools for organizations, businesses and government agencies all over the world;” and educating the public about threats to information systems across the globe. (The Honeynet Project) Here’s a link to their website for more information. - https://www.honeynet.org/about Project Honey Pot “Project Honey Pot is a distributed system for identifying spammers and the spambots they use to scrape addresses from your website. Using the Project Honey Pot system a person can install addresses that are custom-tagged to the time and IP address of a visitor to their site. If one of these addresses begins receiving email, Project Honey Pot tells if messages are spam and also the exact moment when the address was harvested and the IP address that gathered it.” (Project Honeypot) Here’s a link to Project Honey Pot’s website for more information - http://www.projecthoneypot.org/about_us.php Origin and Evolution of Honeypots History of Honeypots (Spitzner, Honeypots: Tracking Hackers, 2003) - “Before 1990 - The concepts of honeypots may have been used but they were not yet called honeypots and there isn’t much documentation of their use. 1990/1991 – First public works documenting honeypot concepts – Clifford Stoll’s “The Cuckoo’s Egg” and Bill Cheswick’s “An Evening with Berferd.” 1997 – Version 0.1 of Fred Cohen’s Deception Toolkit was released, one of the first honeypot solutions available to the security community. - - - 1998 - Development began on CyberCop Sting, one of the first commercial honeypots sold to the public. CyberCop Sting introduces the concept of multiple, virtual systems bound to a single honeypot. Marty Roesch and GTE Internetworking begin development on a honeypot solution that eventually becomes NetFacade. This work also begins the concept of Snort. 1998 – BackOfficer Friendly is released – a free, simple to use Windows based honeypot that introduced many people to honeypot concepts. 1999 – Formation of the Honeynet Project and publication of the “Know Your Enemy” series of papers. This work helped increase awareness and validate the value of honeypots and honeypot technologies. 2000/2001 – Use of the honeypots to capture and study worm activity. More organizations adopting honeypots for both detecting attacks and for researching new threats. 2002 – A honeypot is used to detect and capture in the wild a new an unknown attack, specifically the Solaris dtspcd exploit.” 2004 – Virtual honeypots were introduced which allow multiple honeypots to run on a single server. (Peter & Schiller) Policies and Procedures [Provided by Rajani Gunda] Honeypot Policies 1. Role of honeypot in network security 2. Secure usage of honeypot 3. Security Gateway 4. Prevention, detection and response of honeypot 5. Dark IP addresses Role of honeypot in Network security: This could be used in various research projects. Honey net is participating in network security. Security Gateway: All web administrators should monitor the security gateways. Set up secure shell server on non-standard port. Nessus scan is effective scan could find out the malicious holes on the system. Nessus scan will give the graphs and reports for particular IP. Secure usage of Honeypot: Compromised honeypot on the machines cannot be touched by the third parties. It will give hard times to the attackers and involved to find the new threats. This will block the malicious attackers. Prevention, detection and response of Honeypot: Honey pot securities is divided in to three sections such as Prevention, detection and response Prevention: The primary theme of this prevention is just keep out malicious hacker from the attack. Firewall should be well patched. Targets are indefinable; So Honeypots can detect the attacks but cannot prevent them. If malicious hacker directly attacks on the server, honeypot will prevent the attack form the malicious hacker. Honeypot can distract hacker’s mind on different objectives but it could not prevent the attack except in direct attack from malicious hacker. Detection: Intrusion in networks could be detected by the alarming system like house alarm would work. Some programs would be designed to watch the system logs and those could be trigger or alarm if any unauthorized person enters in to the network. Sometimes it might give false alarms, due to high network traffic on most networks. All data could not be processed by the systems, so there is a chance of dropping of some packets. So above kind of reasons could benefits to the attacker. Response: If any honeypot attack is detected in the past, document it to provide protection from future attacks. Security policies established by the security institutions, if any employee violates these rules, there should provide some proper reasons to the administration. Suspicious packets could be recorded for analysis, to make evaluation process easier. Dark IP addresses: Some IP address should not use or reserved for the public use. These IP addresses database maintained by the IANA (Internet assigned numbers authority). Many Institutions are provided with some IP addresses range, some of which are not used at all. This inactive IP addresses called dark IP addresses. If packet sent to the dark IP addresses, it may lead to the possible attack. If packet sent to dark IP addresses, those are could divide as different attacks such as, i) Scanning/ malicious ii) Broken/ misconfigured iii) Backscatter. If we avoid the misconfigured traffic, we can reduce the false alarms. Backscatter is very dangers and we couldn’t find the actual victim, and it is reflection of packets. Because this relates to electromagnetic waves such as reflection of light, radar, radio, Attacker scan the computer, and disclose his IP address by performing multiple scan with false IP addresses. ICMP packets routed as false IP addresses. Analysis of worms and internet threat could be monitored by the backscatter project. Business Continuity Planning [Provided by Anthony Maziur] Honeypots will help with business continuity by directing the attacker to a fake network setup so that they will not harm any of the company’s files or data. Honeypots are used to divert the attacker from the actual network, can capture information for the administrator to study and make corrections to. Not only does this divert the attacker, but it collects data so that a “profile” is built about the previous attack attempts. By studying these profiles, the person/people in charge of the network can ensure that the network is running at proper capacity 100% of the time and keep business activity normal as usual. Since BCP is an ongoing process as stressed before, the network administrator can review the data and can make changes to the contingency plan as needed. This process should be conducted regularly in order to stay on top of the constant potential threats of having the data compromised Works Cited (n.d.). Retrieved from The Honeynet Project: https://www.honeynet.org/ (n.d.). Retrieved from Project Honeypot: http://www.projecthoneypot.org/index.php (n.d.). Retrieved from HoneyNet Research Project: http://www.muscetta.org/research/honeynet/index.php Ahmad , A., Ali, M., & Mustafa, J. (n.d.). Benefits of Honeypots in Education Sector. Retrieved from http://paper.ijcsns.org/07_book/201110/20111004.pdf Barnett, R. C. (n.d.). Welcome to Honeypots: Monitoring and Forensics. Retrieved from http://honeypots.sourceforge.net/ Cohen, F., Lambert, D., Preston, C., Berry, N., Stewart, C., & Thomas, E. (n.d.). A Framework of Deception. Retrieved from http://www.all.net/journal/deception/Framework/Framework.html Cooper, M. (2002, April). Baby Steps with a Honeypot. Retrieved from http://www.mhconline.co.uk/babysteps.htm Diego, D. G. (2004). Building a GenII Honeynet Gateway. Madrid, Spain. Retrieved from http://www.honeynet.org.es/papers/honeywall/ Dornseif, M., Gartner, F., & Holtz, T. (2004). Vulnerability Assessment Using Honeypots. Forte, D. (n.d.). Part II: Honeypots in Detail: the Variations. Grimes, R. A. (n.d.). Attracting Hackers, Pic2. Retrieved from Flylib.com: http://flylib.com/books/en/1.48.1.20/1/ Gupta, A., Gupta, S., Ganesh, I., Gupta, P., Goyal, V., & Sabharwal, S. (2010). Opaqueness Characteristic of a Context Honeypot System. Information Security Journal: A Global Perspective. Haas, J. (n.d.). Chroot (Jail). Retrieved from About.Com: http://linux.about.com/cs/linux101/g/chrootlparjailr.htm Hernandez y Lopez, M., & Resendez, C. F. (n.d.). Honeypots: Basic Concepts, Classification and Educational Use as Resources in Information Security Education and Courses. Retrieved from http://proceedings.informingscience.org/InSITE2008/InSITE08p069-076Hernan422.pdf honeypots.net. (n.d.). Intrusion Detection, Honeypots and Incident Handling Resources. Retrieved from http://www.honeypots.net/ Information Technology Specialty. (n.d.). Retrieved from Civil Air Patrol & U.S. Air Force Auxiliary Information Technology: http://minisite.sercap.us/page10563289.aspx Mahajan, S. (n.d.). Honeypots. Retrieved from Hacking Begins: http://www.hackingbegins.com/2011/07/honeypots.html McMullen, J. F. (2001, April 12). Get IT Done: Enhance intrusion detection with a honeypot. Retrieved from http://www.techrepublic.com/article/get-it-done-enhance-intrusion-detection-with-ahoneypot/1042983 Mokube, I., & Adams, M. (2007, March). Honeypots: Concepts, Approaches, and Challenges. WinstonSalem, North Carolina, US. Retrieved from http://cs.millersville.edu/~csweb/lib/userfiles/honeypot.pdf Nelson, B., Phillips, A., & Steuart, C. (2010). Guide to Computer Forensics and Investigations. Course Technology, Cengage Learning. Pappas, N. (2008, April 2). Network IDS & IPS Deployment Strategies. Peter, E., & Schiller, T. (n.d.). A Practical Guide to Honeypots. Retrieved from http://www.cse.wustl.edu/~jain/cse571-09/ftp/honey/index.html Ranum, M. J. (n.d.). A Whirlwind Introduction to Honeypots. Retrieved from http://www.certconf.org/presentations/2002/Tracks2002Expert_files/HE-1&2.pdf Reining, C. J. (n.d.). Analysis of a Compromised Honeypot. Retrieved from http://www.packetfu.org/hpa.html Rousse, M. (n.d.). Retrieved from SearchSecurity.techtarget.com: http://searchsecurity.techtarget.com/definition/honey-pot Spitzner, L. (1999). Build a Honeypot. Retrieved from http://www.spitzner.net/honeypot.html Spitzner, L. (2003). Honeypots: Tracking Hackers. Addison-Wesley. Spitzner, L. (2010). Honeypots: Are They Illegal? Retrieved from http://www.symantec.com/connect/articles/honeypots-are-they-illegal Spitzner, L. (n.d.). Honeypots: Definitions and Value of Honeypots. Retrieved from http://www.trackinghackers.com/papers/honeypots.html Spitzner, L. (last modified - 2005, May 12). Know Your Enemy: GenII Honeynets. Spitzner, L. (Last modified - 2006). Know Your Enemy: Honeynets. Retrieved from http://old.honeynet.org/papers/honeynet/ unknown. (n.d.). Honeypots - Not just sticking to research. Waldon Dr., I., & Flanagan, A. (2003). Honeypots: A Sticky Legal Landscape? Rutgers Computer and Technology Law Journal, 1-53. Wikipedia. (n.d.). Honeypot (Computing). Retrieved from Wikipedia: http://en.wikipedia.org/wiki/Honeypot_(computing)