The Honeynet Project Advancements in Honeypot Tools.

Slides:



Advertisements
Similar presentations
Ipchains and Iptables Linux operating system natively supports packet-filtering rules: Kernel versions 2.2 and earlier support the ipchains command. Kernel.
Advertisements

SYSTEM ADMINISTRATION Chapter 19
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
TCP/IP Protocol Suite 1 Chapter 7 Upon completion you will be able to: ARP and RARP Understand the need for ARP Understand the cases in which ARP is used.
Hardware Firewalls: Advanced Feature © N. Ganesan, Ph.D.
Honeywall CD-ROM. Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
ITIS 6167/8167: Network and Information Security Weichao Wang.
Computer Security and Penetration Testing
Honeywall CD-ROM. 2 Developers and Speakers  Dave Dittrich University of Washington  Rob McMillen USMC  Jeff Nathan Sygate  William Salusky AOL.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
TCP/IP Tools Lesson 5. Objectives Skills/ConceptsObjective Domain Description Objective Domain Number Using basic TCP/IP commands Understanding TCP/IP3.6.
1 Chapter 6 Network Security Threats. 2 Objectives In this chapter, you will: Learn how to defend against packet sniffers Understand the TCP, UDP, and.
SUSE Linux Enterprise Server Administration (Course 3037) Chapter 7 Connect the SUSE Linux Enterprise Server to the Network.
Module 1: Reviewing the Suite of TCP/IP Protocols.
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
1 Version 3.1 Module 4 Learning About Other Devices.
Module 7: Configuring TCP/IP Addressing and Name Resolution.
Penetration Testing Security Analysis and Advanced Tools: Snort.
NetFilter – IPtables Firewall –Series of rules to govern what Kind of access to allow on your system –Packet filtering –Drop or Accept packets NAT –Network.
07/11/ L10/1/63 COM342 Networks and Data Communications Ian McCrumRoom 5B18 Tel: voice.
COEN 252 Computer Forensics
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.
1 IP Forwarding Relates to Lab 3. Covers the principles of end-to-end datagram delivery in IP networks.
FEATURES & FUNCTIONALITY. Page 2 Agenda Main topics Packet Filter Firewall Application Control Other features.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Windows 7 Firewall.
IP Forwarding.
COEN 252: Computer Forensics Network Analysis and Intrusion Detection with Snort.
Cisco S2 C4 Router Components. Configure a Router You can configure a router from –from the console terminal (a computer connected to the router –through.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Guide to Linux Installation and Administration, 2e1 Chapter 2 Planning Your System.
Honeynets Detecting Insider Threats Kirby Kuehl
CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003.
KFSensor Vs Honeyd Honeypot System Sunil Gurung
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Snort & Nmap Mike O’Connor Eric Tallman Matt Yasiejko.
Cs490ns - cotter1 Snort Intrusion Detection System
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
Agilent Technologies Copyright 1999 H7211A+221 v Capture Filters, Logging, and Subnets: Module Objectives Create capture filters that control whether.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Sniffer, tcpdump, Ethereal, ntop
Monitoring Troubleshooting TCP/IP Chapter 3. Objectives for this Chapter Troubleshoot TCP/IP addressing Diagnose and resolve issues related to incorrect.
Advanced Packet Analysis and Troubleshooting Using Wireshark 23AF
Firewalls Group 11Group 12 Bryan Chapman Richard Dillard Rohan Bansal Huang Chen Peijie Shen.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
COEN 250 Computer Forensics Unix System Life Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.
Module 10: Windows Firewall and Caching Fundamentals.
1 Syllabus at a glance – CMCN 6103 Introduction Introduction to Networking Network Fundamentals Number Systems Ethernet IP Addressing Subnetting ARP DNS.
1 Connectivity with ARP and RARP. 2 There needs to be a mapping between the layer 2 and layer 3 addresses (i.e. IP to Ethernet). Mapping should be dynamic.
1 Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example.
Chapter 7: Using Network Clients The Complete Guide To Linux System Administration.
An Introduction To Gateway Intrusion Detection Systems Hogwash GIDS Jed Haile Nitro Data Systems.
Fall  Computer Crimes  Operating System Identification  Firewalking 2.
Port Scanning James Tate II
FIREWALL configuration in linux
Chapter 8 ARP(Address Resolution Protocol)
Second Generation Honeynets
Honeypots and Honeynets
TCP/IP Networking An Example
Setting Up Firewall using Netfilter and Iptables
Virtual Private Network
Presentation transcript:

The Honeynet Project Advancements in Honeypot Tools

Presented by Kirby Kuehl Background Feel free to ask questions during presentation. Websites:

About the Honeynet Project Informally began as the Wargames mailing list in Project officially formed in Became a Non-profit organization in Consists of 30 members who volunteer their time and resources to research the hacker community.

Honeynet Project Goals Learn the Tools, Tactics, and Motives of the Hacker Community Raise Awareness through release of “Know Your Enemy” series of whitepapers. Teach and Inform Scan of the Month Challenges Reverse Challenge Forensic Challenge Research Honeynet Alliance Tool Development

Layer 3 Data Control: A shell script counted the number of outbound connections initiated by the attacker and blocked all connections after a count of 10 was reached. This suspicious behavior could lead to the discovery of the firewall via TTL decrementing (traceroute) and possible attack since the firewall obviously has Layer 3 Address (IP Address). Data Capture: The IDS (snort) listens on the span port of the switch, capturing all inbound/outbound traffic.

Generation II Honeynet Sensor Components: The Bridging Firewall Counting and Blocking Connections Improvements Data Control with Snort-Inline Sebek kernel module Honeyd and arpd Sneak Peak of “The Honeywall CD”

Honeynet Data Control The Linux Bridging Firewall Bridges are Layer 2 devices that connect two or more distinct Ethernet segments. All packets received by one interface are transparently copied to the other interface based upon MAC address. A Bridging Firewall is capable of transparently filtering received frames before they are copied to the second interface. Requires a Linux kernel compiled with bridge and bridge firewall support. See for kernel patches and more information.

Honeynet Data Control Method 1: Counting and Blocking Connections IPTables Firewall Script uses the LOG and ACCEPT targets for all inbound connections allowing attackers to enter the honeynet. The IPTables Firewall Script LOGs and ACCEPTs outbound connections until a predefined limit is reached within a specified timeframe. Connection attempts beyond the limit are DROPped. Example Data Control Firewall Script

Honeynet Data Control Method 2: Snort-Inline The Honeynet Project utilizes Snort-Inline in combination with netfilter/iptables operating as a bridging firewall to send packets to userspace for processing. This is accomplished with the QUEUE target. The standard queue handler for IPv4 iptables is the ip_queue module, which is distributed with the kernel and marked as experimental. Snort-inline (the userspace application) uses the libipq API, (which is distributed with iptables) to receive and possibly manipulate the packets traversing the bridge as demonstrated in the next slides. Snort-Inline: Netfilter/iptables:

Snort-Inline Rule Options Drop – The drop rule tells iptables to drop the packet and log it via usual snort means Sdrop – The sdrop rule tells iptables to drop the packet. Nothing is logged. Reject – T he reject rule type tells iptables to drop the packet; log it via usual snort means; and send a TCP reset if the protocol is TCP or an ICMP port unreachable if the protocol is UDP.

Snort-Inline Drop Rule To drop an DNS attack, the signature would look as follows: drop tcp $HOME_NET any $EXTERNAL_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh";

Snort-Inline Drop Rule Management Kernel Space modprobe ip_queue iptables -A OUTPUT -p icmp -j QUEUE Iptables-1.2.7a Ip_queue User Space Snort-InlineSnort Rules = Drop DROP snort –Q –c /snort.conf

Snort-Inline Replace Rule Another option replaces portions of the payload (disabling the effectiveness of the attack) but allowing the connection to continue: alert tcp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh"; replace:"|0000 E8D7 FFFFFF|/ben/sh";)

Snort-Inline Replace Mode Management Kernel Space modprobe ip_queue iptables -A OUTPUT -p icmp -j QUEUE Iptables-1.2.7a Ip_queue User Space Snort-Inline Snort Rules = Replace Internet /bin/sh/ben/sh

Honeyd Honeyd, when used in conjunction with arpd can simulate an entire LAN containing virtual hosts. These virtual hosts can fool various TCP and ICMP fingerprinting methods. These virtual hosts can run various virtual, proxied, or fake services.

Honeyd Operation ping arpd arpd_send: who-has to arpd_reply: is-at 00:09:6b:e0:39:9b honeyd Sending ICMP Echo Reply: > Reply from : bytes=32 time<10ms TTL=64

Honeyd: The role of arpd Like the bridging firewall used by snort- inline, arpd also operates at Layer 2. Arpd replies to any ARP request for an IP address (Layer 3) within the simulated network with the MAC address of the specified interface of the machine running arpd. This allows one host to simulate an entire network of machines.

Arpd Screenshot

Honeyd Screenshot

ARP Cache

Sample Honeyd Configuration # Example of a simple host template and its binding create default set default personality “FreeBSD STABLE” add default tcp port 80 “sh scripts/web.sh” add default tcp port 22 "sh scripts/test.sh $ipsrc $dport" add default tcp port 113 reset add default tcp port 1 reset set default uid gid bind default set uptime #add default tcp port 23 proxy :23 #set default subsystem “/usr/sbin/httpd”

NMAP Portscan and OS Fingerprint

Sebek Kernel Space data collection The Sebek kernel module collects data passing through the read() system call. This captures the intruder’s ssh keystrokes and recovers scp file transfers. Sebek utilizes the adore rootkit to hide the sebek files and processes from the attacker. Sebek : Adore:

Sdm : The Sebek Device Monitor Sdm encrypts the payload. Based on the intruder’s input, the IP addresses, MAC addresses, and UDP port numbers are falsified. Data is transferred using a variable amount of delay. Sdm transmits decoy packets when there is no legitimate traffic.

Sebeksniff and Sbdump Collects the data from sdm, unencrypts it, and stores it in a log file. Use the sbdump.pl script to examine these log files. Sbdump displays the timestamp, user id, process name, tty, file descriptor and the data (ssh keystrokes or file transferred by scp)

Sebek Diagram

Honeywall CD Coming Soon… Bootable CDROM Honeynet Gateway extracts operating system onto a ram drive. Hardware requirements: 256MB of RAM, a CD- ROM, a 10GB IDE hard drive (for logging and storage of various boot variables such as which networks to bridge), and two NICs. Capable of Generation 1 (Layer 3) or Generation 2 (Layer 2) Honeynet Data Control. Kernel contains bridge firewalling support for the inline enabled snort. Also includes Sebek, dsniff, tcpdump, and p0f.

Honeywall CD Main Screen

Initialize drive mounts a local IDE drive for Honeynet Logging and storage of settings.

Start Layer 2 Bridge

Bringing up the bridge and starting various utilities

Wininterrogate: Analysis of Win32 File systems and Processes

Wininterrogate: File system Recursively walks directory structure obtaining the following: File Name Complete Path Directory File Size Creation Time Last Access Time Last Write Time Attributes

Wininterrogate: Processes Display Process Name and Path Process ID (pid) Linked DLLs DLL Entry Point DLL Base DLL Image Size Port Bindings (Windows XP Only)

Wininterrogate: Common Options MD5 Checksum providing similar functionality to tripwire CSV (comma separated value). Import into Microsoft Excel or any database for processing. Extra information Gathered on *.DLL, *.VBX, *.DRV, *.EXE, *.OCX, *.BIN, *.SCR CompanyName FileDescription FileVersion InternalName LegalCopyright OriginalFilename ProductName ProductVersion