honey bot

5
HoneyBOT HoneyBOT is a windows based low interaction honeypot solution. Click here to download the latest version. What is a Honeypot? A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data even including the keystrokes and mistakes made by hackers. The captured information is highly valuable as it contains only malicious traffic with little to no false positives. Honeypots are becoming one of the leading security tools used to monitor the latest tricks and exploits of hackers by recording their every move so that the security community can more quickly respond to new exploits. How does it work? HoneyBOT works by opening a large range of listening sockets on your computer from which a selection of these sockets are designed to mimic vulnerable services. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Should an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot environment can safely store these files on your computer for malware collection and analysis purposes. Our test server has captured several thousand trojans and rootkits from these simulated services including: Dabber Devil Kuang MyDoom Netbus Sasser LSASS DCOM (msblast, etc) Lithium Sub7 Honeypot Placement An organisation may place a honeypot inside their internal network, secured by their perimeter defenses where it should never to be attacked. Any traffic captured on the honeypot in this situation would indicate that another computer inside the network is already infected with a virus or worm, or even that a company employee is attempting to break into the computer. Another method is to attach the honeypot directly to the internet which normally results in captured malicious network traffic in minutes. A direct connection is the most basic setup for honeypot users and in this scenario the honeypot computer is placed external to your production systems and allocated a public IP address. The most popular choice of honeypot placement for internet users is to place the

Upload: scribd1com

Post on 27-Dec-2015

23 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Honey Bot

HoneyBOT

HoneyBOT is a windows based low interaction honeypot solution. Click here to download the latest version.

What is a Honeypot?

A honeypot is a device placed on a computer network specifically designed to capture malicious network traffic. The

logging capability of a honeypot is far greater than any other network security tool and captures raw packet level data

even including the keystrokes and mistakes made by hackers. The captured information is highly valuable as it

contains only malicious traffic with little to no false positives.

Honeypots are becoming one of the leading security tools used to monitor the latest tricks and exploits of hackers by

recording their every move so that the security community can more quickly respond to new exploits.

How does it work?

HoneyBOT works by opening a large range of listening sockets on your computer from which a selection of these sockets are designed to mimic vulnerable services. When an attacker connects to these services they are fooled into thinking they are attacking a real server. The honeypot safely captures all communications with the attacker and logs these results for future analysis. Should an attacker attempt an exploit or upload a rootkit or trojan to the server the honeypot environment can safely store these files on your computer for malware collection and analysis purposes. Our test server has captured several thousand trojans and rootkits from these simulated services including:

DabberDevilKuangMyDoom

Netbus

SasserLSASSDCOM (msblast, etc)Lithium

Sub7

Honeypot Placement

An organisation may place a honeypot inside their internal network, secured by their perimeter defenses where it

should never to be attacked. Any traffic captured on the honeypot in this situation would indicate that another

computer inside the network is already infected with a virus or worm, or even that a company employee is attempting

to break into the computer.

Another method is to attach the honeypot directly to the internet which normally results in captured malicious network

traffic in minutes. A direct connection is the most basic setup for honeypot users and in this scenario the honeypot

computer is placed external to your production systems and allocated a public IP address.

The most popular choice of honeypot placement for internet users is to place the honeypot in your network DMZ

where all unsolicited internet probes are forwarded to your honeypot computer.

Securing Your Honeypot

A honeypot is intentionally put in harms way so it is critical to carry out some security precautions on your honeypot

computer before deployment on any network. This includes updating your operating system with all security updates

and patches and using an updated antivirus product. You should also enable the windows firewall with an exception

for HoneyBOT. If you are unsure how to secure your computer then don't attempt to deploy a honeypot. More...

HoneyBOT Installation

We suggest that you install HoneyBOT on a dedicated computer with no valuable information or resources required of

Page 2: Honey Bot

it. In fact, you want your honeypot to be as free as possible from any legitimate traffic so in broad terms we can

consider any traffic to the honeypot to be malicious in nature.

HoneyBOT requires minimum operating system of windows 2000 and at least 128MB RAM is recommended.

Security Tips

On this page are tips for securing your Windows HoneyBOT. These tips are not represented in any particular order

and may be optional for your individual situation.

Computer Selection

Install HoneyBOT on a dedicated system or virtual machine. A honeypot computer should not be used for any

purpose other than for monitoring the network so that in broad terms we can consider any traffic to or from the

machine to be malicious in nature. Remember that we are attracting attackers to intrude into this system so running

HoneyBOT on a production system is strongly discouraged.

Patches

You should protect your computer by updating your system with service packs and software patches.

Firewall

A firewall will prevent unsolicited connections from reaching your computer. Your firewall rules will need to be relaxed

in order to allow HoneyBOT to accept incoming connections. If you have not disabled Windows services then you

should block them at the firewall.

Disable Windows Services

You should disable any Windows services that are not required for the machine to operate as they offer an attacker a

possible avenue of attack. HoneyBOT cannot listen on a port that is already in use by a Windows service. Some of the

services that you may choose to disable include: Messenger, ClipBook, COM+, FTP Publishing, SMTP, SNMP,

TCP/IP NetBIOS Helper, Telnet, WWW Publishing.

Disable SMB (CIFS)

SMB provides name resolution, network browsing and printing services over TCP/IP. To disable SMB open the

Network Connections window, right click the adapter and select Properties and uninstall Client For Microsoft Networks

and File And Printer Sharing. Note this may break browsing and sharing files on the local network.

Disable NetBIOS (NBT)

SMB services may also be provided over NetBIOS. To disable NetBIOS open the Device Manager window, select

Show Hidden Devices, expand Non-Plug And Play Drivers and disable NetBios Over Tcpip. Note this may break

browsing and sharing files on the local network.

Disable RPC

It is possible to disable RPC by modifying the registry, but removal will leave your machine unstable.

Page 3: Honey Bot

Take a Baseline

Before starting HoneyBOT take a baseline of the current listening services. In the following example the only service

enabled is RPC. Accordingly this service is being blocked at the firewall.

C:\>netstat -anoActive Connections

Proto Local Address Foreign Address State PIDTCP 0.0.0.0:135 0.0.0.0:0 LISTENING 1128

Remote Monitoring

If you are monitoring your honeypot via a remote desktop program then you should change the default listening port to

a random high numbered port.

Got a new tip?

Submit your tips here.

Screenshots

Here is a preview of HonetBOT's main display window listing connections by remote IP and destination port. You can

filter the results by selecting items from the tree on the left.

 

You can double click on a connection to reveal the connection details and see the packets transmitted. In this

connection the attacking computer attempted an IIS overflow exploit.

Page 4: Honey Bot