What Is A Honeypot?
What Is A Honeypot?
What Is A Honeypot?
What is a Honeypot?
A Honeypot can be characterized as a closely monitored network decoy serving
several purposes. Honeypots can be set up to run any type of operating system
and any number of services. The value of a Honeypot is directly proportional to
the amount and type of information we can successfully obtain from it. Aside
from information gathering, a Honeypot has the capabilities of distracting
adversaries from more valuable machines on a network, and can provide early
warning signs about a new type of attack or exploitation trends, and allows in-
depth examination of adversaries during or after exploitation of a host. Another
function that a Honeypot allows is the capturing the keystrokes typed by an
adversary attempting to compromise the Honeypot – this provides particularly
interesting insight if an intruder uses the compromised host as an IRC chat server.
Two levels of Honeypots are described as low interaction and high-interaction.
Their currently exist two types of Honeypots: a physical Honeypot which is a real
machine with its own IP address, and a virtual Honeypot which is simulated by
another machine that responds to network traffic. Physical Honeypots are often
labeled as high-interaction because the system can be completely compromised
and are resource expensive to install and maintain. For example - if you wanted to
implement physical Honeypots for a certain range of IPs on your LAN you would
have to build a separate instance of a Honeypot for each physical IP address.
Virtual Honeypots are often labeled as low interaction because of the low
implementation and maintenance costs. A virtual Honeypot can simulate multiple
Operating Systems, services and a separate TCP/IP stack for each instance of a
Honeypot on that one machine. Honeyd is an example of a virtual honeypot
service; simulating the TCP/IP stack of multiple target operating systems in order
to fool TCP/IP stack fingerprinting by tools like Nmap and Xprobe. Virtual
Honeypots are used more often than physical Honeypots because they require
fewer computer systems, which in turn reduces maintenance costs, and also
allows for a greater variety of hosts to be deployed and observed.
Firewall Logs
Firewalls can be useful in analyzing the incoming and outgoing connections from
your Honeypot. Any network traffic going in and coming out of your Honeypot
should be labeled as suspicious or malicious in nature. However the logged traffic
from your firewall can be tedious to parse through and gather intelligence from.
Depending upon the type of firewall you may be using for your Honeypot project,
some firewalls allow the functionality of sending alerts via email on predefined
suspicious connections from your firewall, which can decrease the amount of data
you have to parse through and make your life easier. For example you may
configure your firewall to send an alert when your Honeypot attempts to establish
an outbound FTP connection. As we know this kind of signature outbound
connection is often associated with the case that the Honeypot has been
compromised and the attacker is now trying to establish an outbound connection.
IDS Analysis
Intrusion Detection Systems like Snort provides its users with basic sources of
information and also depending upon the console you are using with your IDS it
has the capability grouping similar types of alerts, types of network traffic, and
grouping events in chronological order or even characterizing a group of events as
unique alerts.
The three basic sources of information an IDS provides it user are the following:
IDS alerts when suspicious activity has been triggered by a signature, captures
packets of the stored suspicious activity and finally Snort logs ASCII sessions or the
ASCII data detected in the packet payload. For our Honeypot trials these three
sources of information proved to be useful and were stored on our data
capture/store machine. This was accomplished by configuring the data store
machine to log any suspicious activity coming in or going out of the Honeypot. An
important note when analyzing the information provided from the Snort logs is to
also compare the Snort logs against the firewall logs to add layers of confidence
from any conclusions being made from the logs. In our case we compared our
Snort logs to the logs from our router to gain intelligence on time of possible
backdoor attacks or time of compromise of the Honeypot. Generally when an
attacker compromised our Honeypot, the attacker tried to establish an outbound
connection which was easily noticed.
A useful tool that can be used to capture IRC traffic is a tool called privmsg.pl .
Max Vision developed this tool that quickly and efficiently extracts critical
information from IRC chat sessions. IRC or Internet Relay Chat is often used for
hackers to communicate between one another during their attempts to
compromise machines, therefore you should seriously think about trying to log
any IRC traffic that be coming in or out of your Honeypot. Although we were not
fortunate enough to log any kind of IRC traffic it is still an important piece for
better understanding attacker’s motives and next moves.
System Logs
All system activity on your Honeypot is logged locally to a syslog file depending
upon the types of Operating Systems you may choose to use for your Honeypot.
Systems like UNIX, versions of Microsoft Windows, and a few other Operating
Systems have the capability of logging all system activity on the local machine
remotely from another machine. This capability is very useful when trying to find
how an attacker gained access to your Honeypot, where the attack was coming
from, types of system activity that may be suspicious such as reboots, services
being stopped or started, and accounts being disabled or created. Also since this
system activity is being logged remotely we can compare the syslogs of the
Honeypot against the remote server to discover if the attacker may of deleted or
modified the syslog file on the local Honeypot machine. Also as I said above the
information we gather from the syslog can be used to compare against other
logged information from our Firewall and IDS.
Deployment Procedures
Deploying a physical Honeypot can be very time intensive and expensive as
different operating systems may require specialized hardware. Additionally, every
Honeypot requires its own physical system and numerous configuration settings.
Below are some generalized steps used to deploy a basic Honeypot. These steps
are specific to the authors’ situations - they are based on our experiences and the
types network devices, tools and software applications available for our research.
The first step for deploying a Honeypot is finding a machine that you are willing to
sacrifice for the cause of being exploited, hacked and potentially purged of all
data. This can be any computer capable of running the software for data capture
and control.
The second step includes either making the necessary modifications to the
current Operating System or performing a clean installation of a base operating
system onto the machine. A clean installation of your target operating system
offers the best method of controlling what vulnerabilities exist in the soon to be
deployed host.
If you decide to keep the current operating system settings you should be
aware of the dangers of someone exploiting this machine while it is
configured as a Honeypot and released into the wild. For example: sensitive
information about you or someone else may be stored on the machine -
this information may be corrupted, deleted, or stolen during its lifetime as
a Honeypot. If you have chosen to keep the current operating system
configuration you may want to perform additional configurations to the
machine in order to attract malicious traffic. Some common procedures to
make your Honeypot more attractive and susceptible include opening
known vulnerable ports, starting known vulnerable services, creating
network shared drives, using weak passwords and usernames (if any!), and
disable antivirus or firewall software.
If you decide to perform a disk wipe (format) and clean installation of the
operating system your flexibility and range of options increase for the
Honeypot. You won’t have to worry about the disclosure of any sensitive
information previously stored on the host’s hard drive that the attacker
may disclose if he or she gains access. If you decide to go down this path
then some of the common tools you may need include the following: a
common disk wipe utility such as WIPE, boot disk to create partitions and
repartition your wiped hard drive, operating system installation disks, and
any other software or applications you prefer to put on the machine. Keep
in mind additional software packages may include vulnerabilities useful to a
potential intruder.