Professional Documents
Culture Documents
ON
HONEY POT
SUBMITTED TO:
SUBMITTED BY:
Ms. Poonam Kshatriya Shubha Joshi
M.Tech (CS)
Sem II, 2007
2
CONTENTS
S.NO. TOPICS PAGE NO
1. What are Honey-pots 3
2. Etymology 4
3. History of Honeypot 5
4. Classification of Honeypot 7
5. Level of Interaction 8
6. Difference between Low interaction & High Interaction 10
7. Physical vs Virtual Honeypot 11
8. Production vs Research Honeypot 12
9. Advantages of Honeypot 17
10. Disadvantages of Honeypot 18
11. Honeyd 19
12. Honeynets 20
13. Honeynet Architecture 21
14. Advantages of Honeynet 24
15. Disadvantages of Honeynet 25
16. Difference between Honeypot & Honeynet 26
17. Google Hack Honeypot 27
18. References 28
3
What is Honeypot
4
Etymology
5
History of Honeypot
The concept of the honeypot is not new. In fact as early as 1991, a number
of publications expounded on concepts that were to be foundations of
today’s honeypot development. Two publications in particular stood out:
1990/1991 The Cuckoo’s Egg and Evening with Berferd
6
such as telnet logins or SMTP banners thus limiting its ability to
deceive and to study hackers in the long term.
1998 - NetFacade (and Snort)
Back Officer Friendly runs in Windows and was free thus giving
more people access to Honeypot technology. Though It didn’t give
much functionality it was still a very useful piece of software which
demonstrated the concepts of the Honeypot to a lot of people that
who were not familiar to Honeypot concepts at that time.
1999 - Formation of the Honeynet Project 9
7
Classification of Honetpot
• By level of interaction
High
Low
• By Implementation
Virtual
Physical
• By purpose
Production
Research
8
1). Level of Interaction
Interaction defines the level of activity a honeypot allows an attacker.
There are two categories of interaction “Low Level “ & “High Level
Interaction” which helps us understand what type of honeypot you are
dealing with, its strengths, and weaknesses.
9
High Interaction: High-interaction honeypots are different; they are
usually complex solutions as they involve real operating systems and
applications. Nothing is emulated; we give attackers the real thing. If you
want a Linux honeypot running an FTP server, you build a real Linux
system running a real FTP server.
Simulates all aspects of the OS: real systems
Can be compromised completely, higher risk
More Information
Honey-net
Advantages
Extensive amounts of information can be captured. By
giving attackers real systems to interact with, you can learn the full
extent of their behavior, everything from new rootkits to international
IRC sessions.
They make no assumptions on how an attacker will
behave. Instead, they provide an open environment that captures all
activity. This allows high-interaction solutions to learn behavior we
would not expect.
Disadvantages
It increases the risk of the honeypot as attackers can
use these real operating system to attack non-honeypot systems.
As result, additional technologies have to be implement that prevent the
attacker from harming other non-honeypot systems
10
Difference between high level interaction and low level
interaction
Low-interaction High-interaction
Solution emulates operating No emulation, real operating
systems and services. systems and services are provided.
Easy to install and deploy. Can capture far more
Usually requires simply information, including new
installing and configuring tools, communications, or
software on a computer. attacker keystrokes.
Minimal risk, as the emulated Can be complex to install or
services control what deploy (commercial versions
attackers can and cannot do. tend to be much simpler).
Captures limited amounts of Increased risk, as attackers
information, mainly trans- are provided real operating
actional data and some systems to interact with
limited interaction.
Low
Fake Daemon
Operating
system
Disk
High
Other local
resource
11
2). Physical vs Virtual Honeypots
12
3). Production vs Research honeypot
Production honeypots are systems that help mitigate risk in your
organization or environment. They provide specific value to securing your
systems and networks. Their job is to take care of the bad guys. How do
they accomplish this? To answer that question, we are going to break
down security into three categories and then review how honeypots can or
cannot add value to each one of them. The three categories are as:
Prevention:
In terms of security, prevention means keeping the bad guys out. If you
were to secure your house, prevention would be similar to placing deadbolt
locks on your doors, locking your windows, and perhaps installing a
chainlink fence around your yard. You are doing everything possible to
keep out the threat. The security community uses a variety of tools to
prevent unauthorized activity. Examples include firewalls that control what
traffic can enter or leave a network or authentication, such as strong
passwords, digital certificates, or two-factor authentication that requires
individuals or resources to properly identify themselves. Based on this
authentication, one can determine who is authorized to access resources.
Mechanisms such as encryption prevent attackers from reading or
accessing critical information, such as passwords or confidential
documents.
What role do honeypots play here? How do honeypots keep out the bad
guys?
Honeypots adds little value to prevention, since they do not deter the
enemy. In fact, if incorrectly implemented, a honeypot may introduce risk,
providing an attacker a window into an organization. The deception
concept is used to have attackers’ waste time and resources in attacking
honeypots, as opposed to attacking production systems. The deterrence
concept is that if attackers know there are honeypots in an organization,
they may be scared off as they do not want to be detected or they do not
want to waste their time or resources attacking the honeypots.
Both concepts are psychological weapons used to confuse a human
attacker but most attacks are usually performed by automated tools, such
as auto-rooters or worms so deception or deterrence will not be able to
prevent these attacks because there is no conscious individual to deter or
deceive.
Both concepts fail to prevent the most common of attacks: targets of
opportunity. The attacker use automated tools that hack into systems for
them. These attackers do not spend time analyzing the systems they
13
target. They merely take a shotgun approach, hitting as many computers
as possible and seeing what they get into.
However, the time and resources involved in deploying honeypots for
preventing attacks, especially prevention based on deception or
deterrence is time better spent on security best practices. As long as you
have vulnerable systems, you will be hacked. No honeypot can prevent
that.
Detection:
The second tier of security is detection, the act of detecting and alerting
unauthorized activity. If you were to secure your house, detection would be
the installation of burglar alarms and motion detectors. These alarms go off
when someone breaks in. In case the window was left open or the lock on
the front door was picked, we want to detect the burglar if they get into our
house. Within the world of information security, we have the same
challenge. Sooner or later, prevention will fail, and the attacker will get in.
There are a variety of reasons why this failure can happen: A firewall rule
base may be misconfigured, an employee uses an easy-to-guess
password, and a new vulnerability is discovered in an application. There
are numerous methods for penetrating an organization. Prevention can
only mitigate risk; it will never eliminate it.
14
A single false positive is not a problem. The problem occurs when these
false alerts happen hundreds or even thousands of times a day. System
administrators may receive so many alerts in one day that they cannot
respond to all of them and hence start ignoring these false positive alerts
as they come in day after day. Network Intrusion Detection Systems are
very familar with false positives. The only solution to false positives is to
modify the system to not alert about valid, production traffic. This is an
extremely time-consuming process, requiring highly skilled individuals who
understand network traffic, system logs, and application activity.
A false negative is when a system fails to detect a valid attack. The risk is
that a successful attack may occur, but the systems fail to detect and alert
to the activity. NIDS not only face the challenge of false positives but also
have problems with false negatives.
The third challenge to detection is data aggregation. Modern technology is
extremely effective at capturing extensive amounts of data. NIDS, system
logs, application logs—all of these resources are very good at capturing
and generating gigabytes of data. The challenge becomes how to
aggregate all this data so it has value in detecting and confirming an
attack.
Due to their simplicity, honeypots effectively address the three challenges
of detection: false positives, false negatives, and data aggregation. Most
honeypots have no production traffic, so there is little activity to generate
false positives.
Honeypots address false negatives because they are not easily defeated
by new exploits. In fact, one of their primary benefits is they can detect a
new attack by virtue of system activity, not signatures. It works on the
concept that anything sent its way is suspect.
The simplicity of honeypots also addresses the third issue: data
aggregation. Honeypots address this issue by creating very little data.
There is no valid production traffic to be logged, collected, or aggregated.
Honeypots generate only several megabytes of data a day, most of which
is of high value. This makes it extremely easy to diagnose useful
information from honeypots.
Response
15
applies to securing your organization. Honeypots add value to the
response aspect of security.
When an attacker breaks into a system, their actions leave evidence,
evidence that can be used to determine how the attacker got in, what they
did once they gained control of the system, and who were they. It is this
evidence that is critical to capture. Without it, organizations cannot
effectively respond to the incident.
Honeypots can help address these challenges to reaction capability.
Remember, a honeypot has no production activity, so this helps the
problem of data pollution. When a honeypot is compromised, the only real
activity on the system is the activity of the attacker, helping to maintain its
integrity. If we look at our train station analogy, imagine a crime at a train
station where there are no people or trains coming or going. Evidence
such as fingerprints or hair samples are far more likely to remain intact.
The same case is true for honeypots. Honeypots can also easily be taken
offline for further analysis. Since honeypots provide no production
services, organizations can easily take them down for analysis without
impacting business activity.
Prevent
Detect Attackers
Response
Monitor
Attack Data
HoneyPot A
No Connection
Gateway
16
Research Honeypots are complex to deploy and maintain, capture
extensive information and are used primarily by research, military or
government organization. They can be used for the following:
To capture automated threats, such as worms or auto-rooters.
By quickly capturing these weapons and analyzing their malicious
payload, organizations can better react to and neutralize the threat.
As an early warning mechanism, predicting when future
attacks will happen. This works by deploying multiple honeypots in
different locations and organizations. The data collected from these
research honeypots can then be used for statistical modeling,
predicting future attacks. Attacks can then be identified and stopped
before they happen.
To capture unknown tools or techniques
To better understand attackers' motives and organization. By
capturing their activity after they break into a system, such as
communications among each other, we can better understand who
our threat is and why they operate.
To gain information on advanced blackhats
17
Advantages of Honeypot
18
Disadvantages of Honeypot
19
Honeyd
Honeyd is a low-interaction honeypot. Developed by Niels Provos, A virtual
honey pot application, which allows us to create thousands
of IP addresses with virtual machines and corresponding
network services. It is open source software released
under GNU General Public License.
• It is able to simulate big network on a single host.
• It provides simple functionality.
• It gives an attacker to façade to attack
20
Know Your Enemy:
Honeynets
Honeynet
Tradationally information security has been primarily defensive. Firewalls,
Intrusion detection system, encryption; all of these mechanism are used
defensively to protect one’s resource. The strategy is to defend one’s
organization as best as possible, detect any failures in the defense, and
then react to those failures. The problem with this approach is it purely
defensive, the enemy has the initiative. Honeypots attempts to change
that. The primary purpose of honeypot is to gather information on threats.
This information has defferent value for different organization.
Eg.
• Academic research institution may use honeypot
to gather data for research, such as worm activity.
• Security organization may use honeypot to
capture and analyze malware for anti-virus.
• Government organization use them to learn more
about who is targetting them and why???
Honeynets are a prime example of high-interaction honeypot.
Honeynets are not a product; they are not a software solution that you
install on a computer. Instead, Honeyents are an architecture, an entire
network of computers designed to attacked. The idea is to have an
architecture that creates a highly controlled network, one where all activity
is controlled and captured. Within this network we place our intended
victims, real computers running real applications. The bad guys find,
attack, and break into these systems on their own initiative. When they do,
they do not realize they are within a Honeynet. All of their activity, from
encrypted sessions to emails and files uploads, are captured without them
knowing it. This is done by inserting kernel modules on the victim systems
that capture all of the attacker's actions. At the same time, the Honeynet
controls the attacker's activity. Honeynets do this using a Honeywall
gateway. This gateway allows inbound traffic to the victim systems, but
controls the outbound traffic using intrusion prevention technologies. This
gives the attacker the flexibility to interact with the victim systems, but
prevents the attacker from harming other non-Honeynet computers.
21
Honeynet Architecture
interfaces (eth0 and eth1) are what seperate our honeypots from
everything else, these are bridged interfaces that have no IP stack. The
3rd interface (eth2, which is optional) has an IP stack allowing for remote
administration.
22
Analysis is the ability to analyze this data. Data Collection is the ability to
collect data from multiple honeynets to a single source. Of all these
requirements, Data Control is the more important. Data Control always
takes priority as its role is to mitigate risk. We describe each in more detail
below.
23
Data Analysis is the third requirement. Remember, the entire
purpose of a honeynet is information. A honeynet is worthless if you
have no ability to convert the data it collect to information, you must
have some ability to analyze the data. Different organizations have
different needs, and as such will have different data analysis
requirements.
24
Advantages of Honeynet
25
Disadvantages of honeynet
• In reference to risk, there are four general areas we will cover;
Harm: when a honey net is used to attack or or harm other,
non-honey net systems.
Eg. An attacker may break into a honeynet, and then launch
an outbound attack never seen before, successfully harming
or compromising its intended victim.
Detection: Once the true identity of a honey net has been
identified, its value is dramatically reduced. Attacker can
ignore or bypass the honeynet, eliminating its capability for
capturing information.
Disabling: Attackers may want to not only detect a honey
net's identity, but disable its Data Control or Data Capture
capabilities, potentially without the honeynet administrator
knowing that functionality has been disabled (feed the
honeypot with bogus activity, making administrator think that
data capture is still functioning and recording activity when it is
not.)
Violation: Attackers may attempt criminal activity from your
compromised honey net without actually attacking anyone
outside your honey net
Eg. Attackers using a honeypot to upload then distribute illegal
material. Remember, this individual broke into your system on
their own initiative. If detected, this illegal activity would be
attributed to you by way of it being on your system. You may
then have to prove that it was in fact not you who was
responsible for this activity.
26
Difference between Honeypot & Honeynet
– Behind a firewall
27
Google Hack Honeypot
GHH is the reaction to a new type of malicious web traffic: search engine hackers. GHH
is a “Google Hack” honeypot. It is designed to provide reconaissance against attackers
that use search engines as a hacking tool against your resources. GHH implements
honeypot theory to provide additional security to your web presence.
Google has developed a powerful tool. The search engine that Google has implemented
allows for searching on an immense amount of information. The Google index has
swelled past 8 billion pages [February 2005] and continues to grow daily. Mirroring the
growth of the Google index, the spread of web-based applications such as message
boards and remote administrative tools has resulted in an increase in the number of
misconfigured and vulnerable web apps available on the Internet.
These insecure tools, when combined with the power of a search engine and index
which Google provides, results in a convenient attack vector for malicious users. GHH is
a tool to combat this threat.
GHH emulates a vulnerable web
application by allowing itself to be
indexed by search engines. It's
hidden from casual page viewers,
but is found through the use of a
crawler or search engine. It does
this through the use of a
transparent link which isn't
detected by casual browsing but is
found when a search engine
crawler indexes a site. The
transparent link (when well crafted)
will reduce false positives and
avoid a fingerprint of the honeypot.
The honeypot connects to a
configuration file, and the
configuration file writes to a log file
which is chosen during
configuration. The log file contains
information about the host, including IP address, referral information, and user agent.
Using the information gathered in the log file, an administrator can learn more about
attackers doing reconnaissance against their site. An administrator can cross reference
logs and view a better picture of specific attackers.
GHH can be a minimum of 3 files, including the honeypot, the configuration file, and the
log. The transparent link is made into a pre-existing webpage. GHH is written in PHP
and is issued under the GNU Public License.
28
References:
http://en.wikipedia.org/wiki/honeypot
http://www.honeynet.org
www.honeypots.net/
www.honeynet.org/papers/index.html
www.awprofessional.com/articles/article.asp
www.spitzner.net/honeypots.html
www.honeynet.org.papers/cdrom/roo/
www.honeynet.ie.about.html
29