Download presentation
Presentation is loading. Please wait.
1
Honeypots Margaret Asami
2
What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while their moves are being monitored without them knowing 2 types: production research
3
How do honeypots address security ? prevention can’t prevent bad guys ! detection leverages traditional IDS - no false positives nor false negatives reaction provides incident response team un- polluted data & stoppable system
4
Values & Risks + simple to build + high signal/noise ratio - playing with fire
5
How to build a honeypot ? how do we attract intruders ? choose enticing names (e.g., mail.sjsu.edu) how do we know we’re probed ? put honeypot on isolated net behind a firewall set firewall to log all traffic how do we protect our peers ? set firewall to allow all in-coming traffic, but limit out-going traffic ICMP, FTP, DNS are common protocols intruders need
6
How to build a honeypot (cont…) how do we track intruder’s moves ? layer 1: firewall logs layer 2: syslogd hack layer 3: sniffer layer 4: tripwire layer 5: kernel/shell hack each layer lets us learn different things multiple layers spread the risk of compromised data
7
How to build a honeypot ? (cont…) how do we kick them out ? shut-down, take honeypot off-line, remove backdoors, fix vulnerabilities, then put it back on-line how do we make them not know ? by avoiding frequent & substantial changes to honeypot
8
Popular honeypots Backofficer Friendly (BOF) low level of interaction emulates basic services fakes replies Honeyd mid-high level of interaction emulates >400 OSs & services use ARP spoofing to assume victim IP addr
9
Popular honeypots (cont…) Honeynets high level of interaction network of real systems, zero emulation used mostly in research
10
Win98 honeypot 524 unique NetBIOS scans UDP port 137 (NetBIOS Naming Service) UDP port 139 (NetBIOS Session Service) we are not advertized, so why ? default Win98 installation enbale sharing of C:\ drive connect to internet & wait
11
Win98 honeypot (cont…) intruder copies distributed.net client config file to our honeypot
12
Win98 honeypot (cont…) actual config file transfer reveals intruder’s identity
13
Win98 honeypot (cont…) transfer the distributed.net client file transfer the worm itself
14
Win98 honeypot (cont…) next, a crafted c:\windows\win.ini file is uploaded [windows] load=c:\windows\system\msi216.exe infection completes !! next time honeypot reboots: distributed.net client will be run worm will scan and replicate itself worm will add “bymer.scanner” to registry
15
Conclusion a tool, not a solution level of interaction vs risk
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.