Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception.

Slides:



Advertisements
Similar presentations
 Dynamic policies o Change as system security state/load changes o GAA architecture  Extended access control lists  Pre-, mid- and post-conditions,
Advertisements

Information Security 1 Information Security: Security Tools Jeffy Mwakalinga.
Honey Pots: Natures Dessert or Cyber Defense Tool? Eric Richardson.
System Security Scanning and Discovery Chapter 14.
The Honeynet Project Advancements in Honeypot Tools.
Vulnerability Analysis Borrowed from the CLICS group.
Information Security 1 Information Security: Demo of Some Security Tools Jeffy Mwakalinga.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Nikto LUCA ALEXANDRA ADELA. Nikto  Web server assessment tool  Written by Chris Solo and David Lodge  Released on December 27, 2001  Stable release:
Telnet/SSH: Connecting to Hosts Internet Technology1.
Port Knocking Software Project Presentation Paper Study – Part 1 Group member: Liew Jiun Hau ( ) Lee Shirly ( ) Ong Ivy ( )
Intrusion Protection Mark Shtern. Protection systems Firewalls Intrusion detection and protection systems Honeypots System Auditing.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Introduction to Honeypot, Botnet, and Security Measurement
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Penetration Testing Security Analysis and Advanced Tools: Snort.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Karlstad University Introduction to Vulnerability Assessment Labs Ge Zhang Dvg-C03.
Chapter 6: Packet Filtering
IDS – Intrusion Detection Systems. Overview  Concept  Concept : “An Intrusion Detection System is required to detect all types of malicious network.
HoneyD (Part 2) Small Business NIDS This presentation demonstrates the ability for Small Businesses to emulate virtual operating systems and conduct.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
Honeypot and Intrusion Detection System
1 The Firewall Menu. 2 Firewall Overview The GD eSeries appliance provides multiple pre-defined firewall components/sections which you can configure uniquely.
This courseware is copyrighted © 2015 gtslearning. No part of this courseware or any training material supplied by gtslearning International Limited to.
CIS 450 – Network Security Chapter 3 – Information Gathering.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
Honeynets Detecting Insider Threats Kirby Kuehl
CSCE 815 Network Security Lecture 24 Your Jail and HoneyNets April 17, 2003.
What is a “Network Intrusion Detection System (NIDS)"?
KFSensor Vs Honeyd Honeypot System Sunil Gurung
1 CHAPTER 3 CLASSES OF ATTACK. 2 Denial of Service (DoS) Takes place when availability to resource is intentionally blocked or degraded Takes place when.
CSCE 815 Network Security Lecture 25 Data Control in HoneyNets SSH April 22, 2003.
1Of 25. 2Of 25  Definition  Advantages & Disadvantages  Types  Level of interaction  Honeyd project: A Virtual honeypot framework  Honeynet project:
HONEYPOTS PRESENTATION TEAM: TEAM: Ankur Sharma Ashish Agrawal Elly Bornstein Santak Bhadra Srinivas Natarajan.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
1 Reconnaissance, Network Mapping, and Vulnerability Assessment ECE4112 – Internetwork Security Georgia Institute of Technology.
Linux Networking and Security
A VIRTUAL HONEYPOT FRAMEWORK Author : Niels Provos Publication: Usenix Security Symposium Presenter: Hiral Chhaya for CAP6103.
SCSC 555 Frank Li.  Introduction to Enumeration  Enumerate Microsoft OS  Enumerate *NIX OS  Enumerate NetWare OS (skip) 2.
Application Services COM211 Communications and Networks CDA College Theodoros Christophides
1 Figure 4-1: Targeted System Penetration (Break-In Attacks) Host Scanning  Ping often is blocked by firewalls  Send TCP SYN/ACK to generate RST segments.
CHAPTER 9 Sniffing.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Topics Network topology Virtual LAN Port scanners and utilities Packet sniffers Weak protocols Practical exercise.
Secure Wired Local Area Network( LAN ) By Sentuya Francis Derrick ID Module code:CT3P50N BSc Computer Networking London Metropolitan University.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Security with Honeyd By Ryan Olsen. What is Honeyd? ➲ Open source program design to create honeypot networks. ➲ What is a honeypot? ● Closely monitored.
Retina Network Security Scanner
Role Of Network IDS in Network Perimeter Defense.
Enumeration. Definition Scanning identifies live hosts and running services Enumeration probes the identified services more fully for known weaknesses.
Scanning.
Aaron Corso COSC Spring What is LAMP?  A ‘solution stack’, or package of an OS and software consisting of:  Linux  Apache  MySQL  PHP.
Network and Port Scanning Chien-Chung Shen
Unit 2 Personal Cyber Security and Social Engineering Part 2.
Chapter 14.  Upon completion of this chapter, you should be able to:  Identify different types of Intrusion Detection Systems and Prevention Systems.
Defining Network Infrastructure and Network Security Lesson 8.
Common System Exploits Tom Chothia Computer Security, Lecture 17.
CSCE 548 Student Presentation By Manasa Suthram
SSL.
Working at a Small-to-Medium Business or ISP – Chapter 8
Linux Security Presenter: Dolev Farhi |
Introduction to Network Scanning
The Linux Operating System
Securing the Network Perimeter with ISA 2004
Click to edit Master subtitle style
6. Operating Systems Finger printing & Scanning
Network hardening Chapter 14.
Chapter 7 Network Applications
Presentation transcript:

Kirby Kuehl Honeynet Project Member 05/08/2002 Intrusion Deception

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl2 Intrusion Deception—Deceiving the Blackhat Reconnaissance Reconnaissance An inspection or exploration of an area, especially one made to gather military information. A Honeypot MUST appear to be an attractive target.A Honeypot MUST appear to be an attractive target. –Accurate Responses to active (nmap) and passive(p0f) operating system fingerprinting methods, daemon banner queries, port scans, and vulnerability scanners (nessus). nmapp0fnessusnmapp0fnessus –Convincing content if system is running httpd or ftpd. –Inconspicuous in relation to rest of network. –The Honeypot can reside next to production systems so that it is scanned during sweeps or ports can be redirected from production systems to the Honeypot.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl3 Intrusion Deception— Passing Recon Honeynet Project Honeynet Project Honeynet Project Honeynet Project Uses actual default installations of actively exploited operating systems and services.Uses actual default installations of actively exploited operating systems and services. –Nothing is emulated so host’s response to reconnaissance methods will be accurate. –Data Capture (logging), Data Control (firewalling), and Intrusion Detection (alerting) are performed utilizing other HARDENED hosts on the network. –No production hosts on network to eliminate data pollution. All traffic is suspect and is logged in full tcpdump format.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl4 Honeynet Design – Generation I

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl5 Honeynet Design – Generation II The Honeynet Sensor Data Control: Limits outbound connections (hogwash or iptables) allowing Blackhats to obtain their tools, but not attack other systems.Limits outbound connections (hogwash or iptables) allowing Blackhats to obtain their tools, but not attack other systems.hogwash Data Capture: IDS (snort) logging all traffic as well as providing alert mechanism.IDS (snort) logging all traffic as well as providing alert mechanism.snort Deception: No IP Stack.No IP Stack. No TTL decrementing.No TTL decrementing.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl6 Intrusion Deception— Passing Recon Virtual Honeynets Virtual Honeynets Virtual Honeynets Virtual Honeynets VMWare: GuestOS (Honeypot) virtual machine inside HostOSVMWare: GuestOS (Honeypot) virtual machine inside HostOS –GuestOS is caged by denying access to HostOS filesystem. –Host only networking forces the GuestOS to access the network through the HostOS allowing firewalling and intrusion detection. –The Honeynet Project utilizes a Red Hat default installation running inside a Hardened Red Hat installation. –NMAP’s TCP fingerprinting returned unknown OS –Running a mock ecommerce site.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl7 Intrusion Deception— Passing Recon Open source Honeypots Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run simulated TCP services or proxy the service to another machine. The TCP/IP personality (OS Fingerprints) can be adapted so that they appear to be running certain versions of operating systems. Honeyd is a small daemon that creates virtual hosts on a network. The hosts can be configured to run simulated TCP services or proxy the service to another machine. The TCP/IP personality (OS Fingerprints) can be adapted so that they appear to be running certain versions of operating systems. Honeyd Arpd enables a single host to claim all unassigned addresses on a LAN by answering any ARP request for an IP address with the MAC address of the machine running arpd. Arpd enables a single host to claim all unassigned addresses on a LAN by answering any ARP request for an IP address with the MAC address of the machine running arpd. Arpd

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl8 Honeyd / Arpd Configuration

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl9 Intrusion Deception— Passing Recon Commercial Honeypots Commercial Honeypots MantrapMantrap from Recourse Technologies (requires Solaris)Mantrap –Ability to create up to 4 sub-systems (cages) each running Solaris by utilizing separate interfaces (each host will have unique MAC Address). –You can run virtually any application that doesn’t interact with the kernel within the 4 chrooted cages. –Content Generation Module can be used to create realistic data.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl10 Mantrap Configuration

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl11 Mantrap Configuration

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl12 Intrusion Deception— Passing Recon Commercial Honeypots Commercial Honeypots Specter (requires Windows NT)Specter (requires Windows NT)Specter –Specter can emulate one of 13 different operating systems. As of Version 6.02 the IP stack is not emulated so IP fingerprinting tools are not fooled. (A Stealth Plugin is currently under development using raw socket support on XP.) –Specter honeypots offer % emulated services such as: STMP, FTP, Telnet, Finger, POP3, IMAP4, HTTP, and SSH –Custom fake password files and custom HTTP content.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl13 Specter Configuration

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl14 Intrusion Deception— Passing Recon Commercial Honeypots Commercial Honeypots Netfacade from Verizon (requires Solaris)Netfacade from Verizon (requires Solaris)Netfacade –Can simulate up to an entire class C although all hosts will have the same MAC Address. –Simulates 8 different operating systems properly fooling TCP fingerprinting methods. –Simulates 13 different vulnerable services such as FTP (wu academ[BETA-12](1), System V Release 4.0, and SunOS4.1 versions), SSH (SSH Communications Security Ltd's and versions), etc. –Automatically generates hostnames, user accounts, operating systems and running services for simulated hosts through web interface.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl15 Intrusion Deception— Changing with the times Blackhat techniques have become more sophisticated. Blackhat techniques have become more sophisticated. Using kernel module rootkits (adore, kis)Using kernel module rootkits (adore, kis)adorekisadorekis –Process hiding –Keystroke logging –Covert communication channels Polymorphic shellcode (ADMutate)Polymorphic shellcode (ADMutate)ADMutate Fragroute (IDS Evasion)Fragroute (IDS Evasion)Fragroute Honeynet Project Honeynet Project Patching the kernel directlyPatching the kernel directly –Keystroke logging allowing us to capture encrypted outbound traffic (ssh) –Logging via covert communication channels rather than remote syslog –Snort-stable enabling appropriate preprocessors and logging all traffic (Not just TCP/UDP/ICMP) Snort-stable

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl16 Intrusion Deception— Honeynet Alliance Research Alliance Honeynets Research Alliance Honeynets Freedom for organizations to create their own honeynets and participate in a virtual community.Freedom for organizations to create their own honeynets and participate in a virtual community. –Standardized Capture and Logging formats –Events can be forwarded to a common database –Shared Research and Analysis Research Alliance Honeynets exist within advertised environments alongside production systems.Research Alliance Honeynets exist within advertised environments alongside production systems. –Hopefully attracting targeted and more sophisticated attacks.

Networld+Interop Las Vegas 2002: Intrusion Deception by Kirby Kuehl17 Intrusion Deception— More Information –Whitepapers –Forensic Challenge –Scan of the month –Research Alliance –Know your Enemy book