1.3-Basic Packet Analysis Wireshark
1.3-Basic Packet Analysis Wireshark
1
Contents
1. Objectives
2. Definition of Honeypot & Honeynets
3. Benefits & Risk consideration
4. Example of Honeypot tools
5. The Honeynet Project
Credits: David Watson (Honeynet Project) for the some of the contents of this slide
[email protected]
2
Objectives
1. Understand the the concept of honeypots / honeynets and
how they are deployed
3
Know Your Enemy
4
Know Your Enemy (2)
5
Honeypots and Honeynets
• A honeypot is an information system resource whose value
lies in the unauthorized or illicit use of that resource
• Honeypot systems have no production value, so any
activity going to or from a honeypot is likely a probe, attack
or compromise
• A honeynet is simply a network of honeypots
• Information gathering and early warning are the primary
benefits to most organisations
6
Honeypot and Honeynet Types
• Low-Interaction (LI)
– Emulates services, applications and OS’s
– Easier to deploy/maintain, low risk, but only limited information
• High-Interaction (HI)
– Real services, applications and OS’s
– Capture extensive information, but higher risk and time intensive to
maintain
7
Honeypot and Honeynet Types
• Server Honeypots
– Listen for incoming network connections
– Analyse attacks targeting host’s users, services and operating
systems
• Client Honeypots
– Reach out and interact with remote potentially malicious resources
– Have to be instructed where to go to find evil
– Analyse attacks targeting clients and users
8
Honeypot and Honeynet Pros / Cons
Pros Cons
9
Implementing Honeypot
10
Recap
Badness
E
v
i Noise
l
n Malware
e
Honeypots:
s Computer resource(s) to be probed and/or
s attacked
11
Why would you want to do this?
• By right, you should not expect any real activity or traffic
to/from/in your honeypot
• Detect anomalous activities in your network or system?
– Infected / Compromised computers
– Misconfiguration
12
Generic ‘Network-based Attack’
Pattern
Host 2
Host1
1. Connection
initiated to (Or) 2
Honeypot 1
2. Connect
Back / Call- Honeypot
Home (Target)
13
What can you learn?
• Hosts that are trying to connect / scan you
– Potentially already compromised or infected
– such as IP address
14
Example of Client-based Honeypot
2. Analyse response
15
What you can learn?
• (0-day vulnerability attack) or attacks on the Client
Application (i.e. Web Browser)
16
Recap 1
Let us discuss
• What is the difference between IDS and Honeypot?
– Difference between Antivirus vs Honeypot?
17
Artifacts
• 2010:09:14:07:13:10 < honeypot> 2010-09-14
07:19:27 GMT 184.y.z.144
a05dfd7cca7771a7565a154d65f05ea2
http://domain.lv/inx/fx29id1.txt????
19
Deception -> Detection
Honeytokens
• Multiple Forms:
o Usernames / Passwords
o URL / Links
o Files
o Web Pages
o Etc
https://www.canarytokens.org
Implementation
• Canarytokens
o Canarytokens.org by Thinks
o Opensource Source (on Github)
o https://github.com/thinkst/canarytokens
• Dcept by Secureworks
o Opensource
o ActiveDirectory
o https://github.com/secureworks/dcept
28
High Interaction Honeypot
• Think about your goals and objectives first
• Possible scenario
– Setup a real system and make give it an IP address (so it is
reachable to something)
– i.e. Install a Windows, Linux, Unix server
29
Some Examples
• Cowrie : https://github.com/cowrie
30
Dionaea
• 2nd Generation low interaction honeypot
– Python, runs on *NIX
– IPv6 Support
• Goals
– Detect both known and unknown attacks
– Better protocol awareness
– Vulnerability modules in scripting language
– Shell code detection using LibEmu
• Check out http://dionaea.carnivore.it
• Learn about attacks, malware and many more
31
Cowrie
• Emulate SSH server / Telnet Server
– Allow ‘attacker’ to log-in using credentials (username and password)
– Environment allow limited commands – i.e. ping, who, and wget
– Record activities (keylog) of attackers and their activities
32
Glastopf Web Honeypot
• Minimalistic web server written in Python
• Scans incoming HTTP requests strings
• Checks for remote file inclusion (RFI), local file inclusion (LFI)
and SQL injection
• Signatures and dynamic attack detection
• Attempt to download attack payloads
• Search keyword indexing to draw attackers
• MySQL DB plus web console
• Integration with botnet monitoring & sandbox
• Check out Glastopf.org
33
Ghost
• USB Honeypot
• Runs on Windows
• Many malware spread across systems using thumbrive
(and bypass network containment strategies)
– i.e. Stuxnet, Conficker
34
Thug
• Low Interaction Client-based honeypot to emulate web browser
– Browser Personalities (i.e. IE)
– Discovering Exploit Kits, Malicious Websites
• Python vulnerability modules: activeX controls, core browser
functions, browser plugins
• Logging: flat file, MITRE MAEC format, mongoDB, HPFeeds
events + files
• Testing: successfully identifies, emulates and logs IE WinXP
infections and downloads served PDFs, jars, etc from Blackhole
& other attack kits
• More information
– http://www.honeynet.org/node/827
35
Tools and Projects
• Cuckoo Sandbox
• Visualization
• The Honeynet Project
– HPFeed
36
Cuckoo Sandbox
• Automated Malware Analysis System
– Why not just use Anti-Virus?
• Analyze Windows executables, DLL files, PDF documetns,
Office documents, PHP Scripts, Python Scripts and Internet
URLs
• Windows guest VMs in Virtual Box Linux
• Windows hooking / driver plus python modules for
extracting and analysing sample executions
37
Cuckoo Sandbox (2)
• Trace of relevant win32 API calls performed
• Dump network traffic generated (pcap)
• Creation of screenshots taken during analysis
• Dump of files created, deleted and downloaded by the
malware during analysis
• Extract trace of assembly instructions executed by malware
process
• http://www.cuckoosandbox.org/
• http://www.malwr.com
38
Visualization
• Many of the tools do not really have a GUI
• Reporting / Presentation is key
• Many visualization tools
– PicViz
– Afterglow
– Gnuplot
– Splunk
– Plug-ins or front-end for many of the existing tools
39
The Honeynet Project
• The platform for those interested in running, building and
learning from honeypots
– http://www.honeynet.org
40
Consider!
41
42
THANK YOU
www.facebook.com/APNIC
www.twitter.com/apnic
www.youtube.com/apnicmultimedia
www.flickr.com/apnic
www.weibo.com/APNICrir
43