A short introduction to honeypots
Download
Report
Transcript A short introduction to honeypots
A short introduction to
honeypots
Εμμανουήλ Βασιλομανωλάκης
Υποψήφιος Διδάκτωρ
Telecooperation Group, Technische Universität Darmstadt
Center for Advanced Security Research Darmstadt (CASED)
Συνεργάτης Εργ. Δικτύων ISLAB, ΙΠΤ, ΔΗΜΟΚΡΙΤΟΣ
[email protected]
Outline
Introduction
Classifications
Deployment Architectures
Open source vs. nothing
2 Honeypots
SURFcert IDS & experiences from Demokritos
Future work - ideas
4/21/2013
Telecooperation Group | CASED
Introduction
Definition: “A security resource who's value lies in being probed,
attacked or compromised”
Doesn’t have to be a system: Honeytokens
We want to get compromised!
Certainly not a standalone security mechanism.
Why?
• FUN!
• No false-positives!
• Research: Malware analysis/reverse engineering
• Reducing available attack surface/early warning system
4/21/2013
Telecooperation Group | CASED
Honeypot Classifications
Low interaction: simulate network operations
(usually at the tcp/ip stack)
[Medium interaction: simulate network operations
(with more “sophisticated” ways)]
High interaction: real systems
(e.g., VMs)
Other classifications:
• Purpose: Generic, Malware collectors, SSH, etc.
• Production – Research (not really useful)
4/21/2013
Telecooperation Group | CASED
Honeypot Deployment Architectures
4/21/2013
Telecooperation Group | CASED
Open Source vs. nothing (really!)
4/21/2013
Honeypot
Type
OS
Language
GUI
License
Honeyd
Generic
LINUX
C
N
GNU
Nepenthes
Malware
LINUX
C
N
GNU
Dionaea
Malware
LINUX
PYTHON
N
GNU
Honeytrap
Generic
LINUX
C
N
GNU
LaBrea
Generic
LINUX
C
N
GNU
Tiny HP
Generic
LINUX
PERL
N
GNU
HoneyBot
Malware
WINDOWS
-
Y
CLOSED
Google Hack
HP
WEB
-
PHP
Y
GNU
Multipot
Malware
WINDOWS
VB 6
Y
GNU
Glastopf
WEB
-
PYTHON
Y
GNU
Kojoney
SSH
LINUX
PYTHON
N
GNU
Kippo
SSH
LINUX
PYTHON
N
BSD
Amun
Malware
LINUX
PYTHON
N
GNU
Omnirova
Malware
WINDOWS
Borland Delphi
Y
GNU
BillyGoat
Malware
-
?
?
CLOSED
Artemisa
VOIP
-
PYTHON
N
GNU
GHOST
USB
WINDOWS
C
Y
GNU
Telecooperation Group | CASED
Dionaea
Low Interaction honeypot for collecting malware
Nepenthes successor
Basic protocol simulated: SMB (port 445)
Others: HTTP, HTTPS, FTP, TFTP, MSSQL and SIP (VOIP)
Also supports IPv6 and TLS
Malware files: stored locally or/and sent to 3rd party entities
(CWSandbox, Norman Sandbox, Anubis, VirusTotal)
4/21/2013
Telecooperation Group | CASED
Kippo (1/2)
Low interaction SSH honeypot
Features:
• Presenting a fake (but “functional”) system to the attacker
(resembling a Debian 5.0 installation)
• Attacker can download his tools through wget, and we save
them for later inspection (cool!)
• Session logs are stored in an UML- compatible format for
easy replay with original timings (even cooler!)
Easy to install, but hard to get hackers!
4/21/2013
Telecooperation Group | CASED
SURFcert IDS
An open source (GPLv2) distributed intrusion detection
system based on honeypots
Sensors, act as proxies, forwarding network traffic from the
monitored network to the system’s center using OpenVPN
Supported Honeypots: Nepenthes, Dionaea, Argos, Kippo
Three parts:
Tunnel – honeypot server
Web – Logging server
Sensors
4/21/2013
Telecooperation Group | CASED
SURFcert IDS
Also:
• Supports p0f for attackers’ OS detection
• Statistics, nice web-GUI, sensor status, geographical
visualizations, and more…
4/21/2013
Telecooperation Group | CASED
SURFcert IDS @ Demokritos
Some stats:
• 21.000 attacks on 3 different sensors (1 month)
• 1500 malware files downloaded
• Main target: port 445
Successfully detected infected systems, inside our network
(mostly with a Conficker Worm variant)
Automatic malware analysis can give us valuable information
on Botnets (and their C&C IRC servers)
Possible to find zero-date exploits / new malware
(or different variants)
4/21/2013
Telecooperation Group | CASED
Future Work - Ideas
Features:
Attacker scans our system
Better visualization
Anti-evasion techniques
Cheap & easy mobile sensors:
Raspberry Pi
Advertising honeypots
Attacker trying to connect
to our “ftp” server
Honeypots:
Mobile honeypots (e.g., Android)
SCADA – Industrial Control Systems (ICS)
4/21/2013
Telecooperation Group | CASED
Thank You
Questions?
Telecooperation Group | CASED
Backup slides
Telecooperation Group | CASED
Useful Links
Interesting stuff:
• http://www.islab.demokritos.gr – Many honeypot-related theses available
• https://www.enisa.europa.eu/activities/cert/support/proactivedetection/proactive-detection-of-security-incidents-II-honeypots - Report
from ENISA regarding honeypots
• http://publicids.surfnet.nl:8080/surfnetids/login.php - Demo version of
SURFcert IDS
Honeypots:
•
•
•
•
http://www.honeynet.org – General information on honeypots
http://dionaea.carnivore.it – Dionaea honeypot
http://amunhoney.sourceforge.net – Amun honeypot
http://map.honeynet.org – Honeypots visualization
4/21/2013
Telecooperation Group | CASED
SURFcert IDS @ Demokritos
[outside main
firewall]
DMZ 1
Honeynet IP space
TUNNEL –
HONEYPOT
SERVER
Internal
Firewall
Sensor 3
DMZ 2
WEB – DB
SERVER
[inside main firewall]
Institute B
Institute A
DMZ X
INTERNAL
MANAGE
MENT PC
Sensor 2
4/21/2013
Sensor 1
Telecooperation Group | CASED