The Honeypot Project By Itzik Jislin Yiftach Benjamini Supervisor: Ben Bershtein.

Slides:



Advertisements
Similar presentations
IS 376 NOVEMBER 5, DATA BREACH INVESTIGATIONS REPORT By The Verizon RISK Team Research Investigations Solutions Knowledge.
Advertisements

HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
Thank you to IT Training at Indiana University Computer Malware.
1 Web Servers / Deployment Alastair Dawes Original by Bhupinder Reehal.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Computer Monitoring System for EE Faculty By Yaroslav Ross And Denis Zakrevsky Supervisor: Viktor Kulikov.
Network Security Testing Techniques Presented By:- Sachin Vador.
Intrusion Prevention System DYNAMIC HONEYNET by Rosenfeld Asaf advisor Uritzky Max.
January 14, 2010 Introduction to Ethical Hacking and Network Defense MIS © Abdou Illia.
S EC (4.5): S ECURITY 1. F ORMS OF ATTACK There are numerous way that a computer system and its contents can be attacked via network connections. Many.
Information Networking Security and Assurance Lab National Chung Cheng University 1 A Real World Attack: wu-ftp.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Cambodia-India Entrepreneurship Development Centre - : :.... :-:-
COMPUTER TERMS PART 2. NETWORK When you have two or more computers connected to each other, you have a network. The purpose of a network is to enable.
Computer Networks IGCSE ICT Section 4.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Chapter 6: Hostile Code Guide to Computer Network Security.
2851A_C01. Microsoft Windows XP Service Pack 2 Security Technologies Bruce Cowper IT Pro Advisor Microsoft Canada.
R. FRANK NIMS MIDDLE SCHOOL A BRIEF INTRODUCTION TO VIRUSES.
Introduction to Honeypot, Botnet, and Security Measurement
1 Chap 10 Malicious Software. 2 Viruses and ”Malicious Programs ” Computer “Viruses” and related programs have the ability to replicate themselves on.
Data Security.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Malicious Code Brian E. Brzezicki. Malicious Code (from Chapter 13 and 11)
Network Security Introduction Some of these slides have been modified from slides of Michael I. Shamos COPYRIGHT © 2003 MICHAEL I. SHAMOS.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
Software Security Testing Vinay Srinivasan cell:
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
A virus is software that spreads from program to program, or from disk to disk, and uses each infected program or disk to make copies of itself. Basically.
CHAPTER 14 Viruses, Trojan Horses and Worms. INTRODUCTION Viruses, Trojan Horses and worm are malicious programs that can cause damage to information.
Virus Detection Mechanisms Final Year Project by Chaitanya kumar CH K.S. Karthik.
1 Figure 4-16: Malicious Software (Malware) Malware: Malicious software Essentially an automated attack robot capable of doing much damage Usually target-of-opportunity.
Security at NCAR David Mitchell February 20th, 2007.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
HONEYPOT By SIDDARTHA ELETI CLEMSON UNIVERSITY. Introduction Introduced in 1990/1991 by Clifford Stoll’™s in his book “The Cuckoo’s Egg” and by Bill Cheswick’€™s.
Linux Networking and Security
Week 10-11c Attacks and Malware III. Remote Control Facility distinguishes a bot from a worm distinguishes a bot from a worm worm propagates itself and.
Computer Networking From LANs to WANs: Hardware, Software, and Security Chapter 13 FTP and Telnet.
Module 6: Integrating ISA Server 2004 and Microsoft Exchange Server.
Computer Viruses and Worms By: Monika Gupta Monika Gupta.
1 Security Penetration Testing Angela Davis Mrinmoy Ghosh ECE4112 – Internetwork Security Georgia Institute of Technology.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Topic 5: Basic Security.
Malicious Software.
NetTech Solutions Protecting the Computer Lesson 10.
IT Computer Security JEOPARDY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Computer Security By Duncan Hall.
Slammer Worm By : Varsha Gupta.P 08QR1A1216.
Role Of Network IDS in Network Perimeter Defense.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Security on the Internet Norman White ©2001. Security What is it? Confidentiality – Can my information be stolen? Integrity – Can it be changed? Availability.
Microsoft OS Vulnerabilities April 1, 2010 MIS 4600 – MBA © Abdou Illia.
Application Communities
Internet Quarantine: Requirements for Containing Self-Propagating Code
Instructor Materials Chapter 7 Network Security
Secure Software Confidentiality Integrity Data Security Authentication
Protect Your Computer Against Harmful Attacks!
Chap 10 Malicious Software.
A Distributed DoS in Action
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Web Servers / Deployment
Chap 10 Malicious Software.
Designing IIS Security (IIS – Internet Information Service)
Test 3 review FTP & Cybersecurity
Presentation transcript:

The Honeypot Project By Itzik Jislin Yiftach Benjamini Supervisor: Ben Bershtein

Introduction

What is a Honeypot? "A honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource." - Lance SpitznerLance Spitzner

Honeypot Overview A Honeypot has no functional value A Honeypot does not do anything active. Its value lies in the knowledge that any access to the Honeypot is probably malicious In a perfectly safe network a Honeypot should see no traffic at all

Honeypot Overview - Advantages Small data sets of high value Very flexible –does not rely on a fixed database (Like Anti-Virus software). Allows the detection of new and unknown methods and tools Minimal resources –Since Honeypots are not intended to actually server a magnitude of clients they need very little resources Simple –Honeypots are simple to install and maintain

Honeypot Overview - Disadvantages Limited view –A Honeypot can observe only interaction with itself. It is not a sniffer and cannot log actions against other functional systems in the network Risk –Depending on the type of the Honeypot the risk can be greater or lesser. But there is always a risk to the network when a multitude of servers are active in it.

Honeypots Overview - Types Low-Interaction –Simulates some network services (HTTP, Telnet, FTP, etc … ) –Very low risk (Interaction is only with a simulation) –Less flexible (Can only simulate what was programmed) –Easier to identify –Examples are: Specter, honeyd, our project

Honeypots Overview - Types High-Interaction (Sacrificial Lamb) –Real servers running some kind of logging software –High risk (Attacker is working with the real thing) –Almost impossible to identify

Honeypots Overview - Honeynets

Overview – But what good is it? Collect data –Allows researching attackers methods and tools and developing counter-tools. Prevention –“ Sticky ” Honeypots slow down scanning capabilities of attackers by slow response times –If the usage of Honeypots is publicly known it might deter hackers from attacking the network for fear of being caught

Overview – But what good is it? Detection and Response –If a Honeypot detects suspicious activity it can send an or sms to a network administrator –A Honeypot is a non essential system, so taking it offline in order to analyze damage done by an attack will be less harmful and disruptive to the functionality of the network

Overview – But what good is it? Counter Attack –A Honeypot could be configured to actively respond when it detects attacks coming from systems within its network. For instance if it detects worm activity from some system in the network it can quarantine the system or shut it down or even use some routine to purge the worm

Overview - Threats Viruses –Pieces of software that attach to innocent files. Consume computers recourses and may be even more malicious (deleting files, ruining hardware, etc … ). Rely on social engineering for spreading Worms –Self propagating code. Searches for communication vulnerabilities and uses them to infect more computers at an exponential rate.

Overview - Threats Humans –White Hats – “ Good ” Hackers searching for vulnerabilities in order to report them and increase security awareness –Black Hats – Hackers with personal gain or mayhem in mind. Break into systems in order to steal or corrupt data. –Script Kiddies – Tool users. No real understanding of what the are doing. Techniques usually include scanning for a system and then hammering it with various tools in order to find a vulnerability.

Our Solution The path to implementation

Phase I – How to simulate an IIS? Fingerprinting using HMAP HMAP vs. HMAP vs. Our Honeypot

Phase II – How do you hack a web server? Directory traversal (double decode) Buffer Overflow (Code Red) Malformed SQL statements

Phase II – How do you hack a web server? Look for directories set up by default with execute permissions These directories may also hold default scripts that contain vulnerabilities Find them by sending requests like these: –GET /frick.html HTTP/1.0 –GET /scripts/ HTTP/1.0 –GET /_vti_pvt/ HTTP/1.0 –GET /cgi-bin/GetFile.cfm HTTP/1.0 –Etc …

Phase II – How do you hack a web server? If we find such a directory we can send malicious strings that use known vulnerabilities such as the “ double decode ” directory traversal attack Our mission is to execute the cmd.exe program that will get us root access to the computer

Phase II – How do you hack a web server? Example: –Send the string: /..%35%63..%35%63..%35%63..%35%63winnt/system3 2/cmd.exe?/c+dir+c: –Since the../../../ attack is well known it checks for it. (Can ’ t find it in this string) –Then it decodes the string changing %35 to ‘ 5 ’ and %63 to ‘ c ’. Now we have: /..%5c..%5c..%5c..%5cwinnt/system32/cmd.exe?/c+dir +c: –Now it realizes it forgot to decode %5c which surprisingly decodes to a ‘/’ /../../../../winnt/system32/cmd.exe?/c+dir+c: –Now we have root permissions

Simulating Port Scanning Knocker FrontEnd – port scanner

Vulnerabilities check N-Stealth Security Scanner

Phase III Implement

Based On Visual C++.net Visual Basic.net (GUI) Winsock2 ODBC

Honeypot Architecture Deployment: Attacker Network Scan

Honeypot Architecture The program is divided into two main applications. –GUI – Allows an easy way of starting and stopping the servers, searching through collected data and displaying statistics –Honeypot_Core – Creates and maintains the servers. Collects the data from the users and updates the databases

Honeypot Architecture Block Diagram

Honeypot Architecture Communication between GUI and core is done over Winsock Why Winsock? Answer: –There were many available options: RPC, Signaling, Shared memory, And much more –We wanted to allow for the expansion of the deployment scheme. Suppose you want to run multiple instances of the core on different computers. –Using Winsock allows running the GUI on one machine while controlling others over the network

Honeypot Architecture - Classes

myDb –A class used as an interface with our ODBC database. –Functions: Connect to the db Disconnect from the db Insert data into a table in the db

Honeypot Architecture - Classes mySock –A class used as an interface with the winsock2 objects –Functions: Create a new socket Set socket options (Timeout) Connect to a server Accept (Listen) new connections Send data Receive data Close socket

Honeypot Architecture - Classes myServer –A class used to create and maintain server objects. New servers are created by inheritance and need to implement the serveClient virtual function. –Implementation allows easy way to add new services in the future –Functions: Create and init a server Start the server Stop the server

Honeypot Architecture – myServer

Honeypot Architecture – HTTPServer The purpose is to “ catch ” malicious http strings sent as innocent requests The http server emulates a Microsoft IIS 5.0 web server The emulation displays only one page taken from index.htm The Honeypot is completely safe from all attacks since it does actually try to execute any commands sent at it. It ’ s default response is “ Not implemented ”

Honeypot Architecture – HTTPServer

Honeypot Architecture – TELNETServer The purpose is to observe the usernames and passwords attackers will try when hacking a telnet server This will allow the creation of a common used passwords database so that users can be advised (or required) as to what passwords not to use It can also help detecting stolen passwords The server emulates nothing more than the login handshake. All logins fail

Honeypot Architecture – TELNETServer

Honeypot Architecture – Communication Flow

Demonstration

Summery

Honeypots are a cheap and simple way to add protection to a network Honeypots allow the study of attackers methods of operation. And help developing new ways for countering them.

Possible Future Additions More services such as ftp, messenger, p2p applications Allow administration of multiple servers via network Add the ability to answer as different ip addresses Emulate different kinds of web servers other than IIS Emulate a more complex telnet session

Thanks! We wish to thank: –Ben for his help and endless patience –Ilana and the Tochna lab team –Our families