20160628-liengtiraphan-cannistra-lightning talk …...2016/09/28  · a honeypot consists of data...

12
HOW TO MAKE A HONEYPOT Piradon (Tien) Liengtiraphan Vallie M. Joseph Prof. Robert Cannistra Marist College © 2016 Internet2

Upload: others

Post on 08-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

HOW TO MAKE A HONEYPOT

Piradon (Tien) LiengtiraphanVallie M. Joseph

Prof. Robert CannistraMarist College

© 2016 Internet2

Page 2: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

ThreatstoInternetSecurityCybersecuritythreatsareconstantlyincreasingTechnologyusedbyattackerssteadilyadvancingalongsidesecuritymeasures

Attackersalwayshavetheadvantage.(Onevectorneeded)Defenders(Allvectorsmustbeaccountedfor)

TypesofThreatsBotnetsDOS/DDOSBulkLoginAttemptsManyothers

Nearlyimpossibletostayaheadofattackersusingonlydefensestrategies

Page 3: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

DefensivevsProactiveStrategiesBusinessesmustnowemploytheuseofnotonlydefensivebutproactivestrategiesaswell.Defensive

PatchingsecuritysoftwareafterharmfulattacksKeepingsecuritysoftwareuptodateSearchfortoolsthatdealspecificallywiththetypeofattackthebusinessissufferingfrom

Example:Patch-and-PrayProactive

UsinganalyticstoadjustsecurityprotocolsasneededPredict/IdentifyattackpatternsAllowfirewallsandothercybersecurityprotocolstolearnfromattacks

Example:Honeypots

Page 4: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

Whatisahoneypot?“Ahoneypot isacomputersecuritymechanismsettodetect,deflect,or,insomemanner,counteractattemptsatunauthorizeduseofinformationsystems.Generally,ahoneypotconsistsofdata(forexample,inanetworksite)thatappearstobealegitimatepartofthesitebutisactuallyisolatedandmonitored,andthatseemstocontaininformationoraresourceofvaluetoattackers,whicharethenblocked.”

-Loras R.Even(SANS)

Cowrie

Page 5: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

Whydoweneedhoneypots?DivertingAttackers

Adatabreachistheunfortunateresultofalackofsecurity.Howeverhavingawallthatabsorbsamajorityofattackscankeepyoursystemandinformationsafe.Havingaresourcethatlookvaluableandiseasilyaccessedhelpsshiftfocusfromotherbetterprotectedresources.

Whynotsimplyblockallattacks?PlethoraofvaluableinformationgainedfromtheattackstothesysteminformationcanbeusedforlateranalyticsAnalyticscanthenbeusedtocreatepredictivesecurityprotocolsItisjustasimportanttoknowwhatpeopledooncetheyareinaswellashowtheygetin.

Page 6: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

Whydoweneedhoneypots?DataCollection

Whattocollect?IP,Username\PasswordCombination,Geolocation,ISP,etc..

IsrelativetowhatpurposethehoneypotservesWhatdowedowiththedata?

LearnmoreaboutattackersUsewhatislearnedtoperformpredictiveanalytics

Howdowedothis?LongtailSyslogAnalyzers

IPCountingfunctions,CountryCountingfunctions,etc.

Page 7: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

LongtailAnalyticsOpensourceanalyticssoftware

CreatedatMaristCollegeCrawlsthroughinformationprovidedbySSHhoneypotsAnalyzesdifferenttypesofattackstosortthemintoattackpatterns

AttackPatternsCandetermineiftheattackisabotnetattack

AlsoidentifiesandclassifiesbotnetsInformationhasuseforthefuture

CouldbeusedtocreatedynamicfirewallsProactivelydeploysecurityprotocolstohelpdefendagainstattacks

Page 8: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

IssuewithHoneypots:Fingerprinting/FingerprintScanning

Fingerprinting“Theactofperformingadeep,intensivescanonanetworkorprogramtoenumerateitssourcesanddependencies”

-TechTarget

AttackercanthenfindtheweaknessspecifictothenetworktheyfingerprintIfaresourcecanbefingerprinted,theinformationgainedcouldbeusedtocompromisethesystem.

Ahoneypotmustbeconvincing,ergoitmustmimiceverything,downtotheresource’sfingerprintAchievingafullmimiccanbedifficult,especiallyifthehoneypotliesonadifferentserverorport

Page 9: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

FingerprintingThroughourvendorpartnerswehavebeenabletopreventfingerprintingofaprotectedresource.

HoweverforahoneypottoworkitmuststillmimictheresourcetothebestofitsabilityBesttospoofthefingerprint

Dependingonthetypeofhoneypotcreated(client,ssh,applicationspecific,etc),differentitemsmayneedtobespoofed

ForExampleSSHHoneypot:

NeedstohaveanequalamountofopenportsastherealSSHportalShouldhavesimilarlibrariesinstalledonit

ClientHoneypotShouldrunonthesamekindofserverastherealclientMustmimicthelookandfeeloftheclient

Page 10: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

ExamplesofFingerprinting

12 Open Ports Found

Page 11: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

FingerprintingwithBlackRidge

Page 12: 20160628-liengtiraphan-cannistra-Lightning Talk …...2016/09/28  · a honeypot consists of data (for example, in a network site) that appears to be a legitimate part of the site

ConclusionAneffectivesecurityplanmustincludebothoffensiveanddefensivestrategiesThebestwaytohaveadequatesecurity,thereneedstobedefenseindepth

Useofamultitudeoftechnologiessuchasfirewalls,specificsecurityprotocolsandadaptivesecurity

Honeypotsaddanadditionallayerofsecurity,butcanalsobeusedtogeneratedataforpredictivesecurityThehoneypotshouldfingerprintasthedetectedresourceDataiscollectedfromthehoneypotsenttobeanalyzedbyanopensourceanalyticssoftwarecodenamed“Longtail”TheoutputofLongtail isthenusedtogenerateinformationthatservetorepresentthegeneraltrendofattackstowardthesecuredresource