honeypots

15
An Introduction An Introduction to Honeypots to Honeypots J. Scott Christianson

Upload: j-scott-christianson

Post on 27-Jan-2015

7.756 views

Category:

Technology


2 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Honeypots

An Introduction to An Introduction to HoneypotsHoneypots

J. Scott Christianson

Page 2: Honeypots

J. Scott Christianson

Experience/Education– Worked for a consortium

of schools for eight years– Own and operate

Kaleidoscope Consulting– Firewall Installation– Network Design– M.A., Educational

Technology, The George Washington University.

Certifications– CISSP– SANS GIAC– MCSE– Cisco CNA 1.0, 2.0– CVE– NACSE Senior

Network Specialist– Sonicwall SCSA– Network +, etc.

Page 3: Honeypots

Today’s Session

What is a Honeypot? Types of Honeypots Honeypot Deployment Demonstration Legal Issues Resources

Page 4: Honeypots

Honeypot Defined

“A honeypot is a resource whose value is in being attacked or compromised. This means that a honeypot is expected to get probed, attacked and potentially exploited. Honeypots do not fix anything. They provide us with additional, valuable information.”

--Lance Spitzner

“Intrusion Deception Systems”

Page 5: Honeypots

Honeypot Uses

Research– Discover new attacks– Understand the blackhat community and their attacks– Build some better defenses against security threats

Production– Distraction– Detect internal threats: “Policy/Law Enforcement”– Security Assessment (Constantly monitors the average

security provided by the network)

Page 6: Honeypots

Honeypots Characteristics

Since Honeypots are not normally used by the organization, they will only be accessed by “intruders”

Honeypots collect very little data, and what they do collect is normally of high value.

Honeypots all share one huge drawback; they are worthless if no one attacks them

Honeypots can introduce risk to your environment.

Page 7: Honeypots

Types of Honeypots

Honeypots are classified by the degree an attacker can interact with the operating system– The more an attacker can interact with a honeypot, the

more information we can potentially gain from it, however the more risk it most likely has.

Types– Low-Involvement Honeypot– Mid-Involvement Honeypot– High-Involvement Honeypot

Page 8: Honeypots

Honeypot Deployment

A honeypot can be a specialized program running on a hardened machine (BOF, Specter, Mantrap, etc).

A honeypot can be an unpatched server. For example, a IIS server with the default install.– Use firewall to protect the outside world– Hogwash (Snort based IP scrubber)

http://hogwash.sourceforge.net/

Page 9: Honeypots

Low/Mid Interaction Honeypot Runs on Microsoft OSs Specter can emulate one of 13 different operating

systems. As of Version 6.02, the IP stack is not emulated so IP

fingerprinting tools are not fooled. Custom fake password files and custom HTTP

content. Pricing: full version $899, Lite $599 www.specter.com

Page 10: Honeypots

Virtual Honeypots

VMware ($299 from vmware.com)

Host Operating Systems is Hardened

Guest Operating Systems are the Honeypots (unpatched OSs)

Internet

Host Operating System

Guest OS Guest OS Guest OS

Page 11: Honeypots

Honeynets

http://project.honeynet.org An extension of a Honeypot Network topology provides many

advantages over standard honeypot– Covert logging– More points of attack for a blackhatter– Looks realistic from the outside

Page 12: Honeypots

Issues Raised: Privacy

Electronic Communication Privacy Act (18 USC 2701-11)

Federal Wiretap Statute (Title III, 18 USC 2510-22)

The Pen/Trap Statute (18 USC § 3121-27)

Page 13: Honeypots

Issues Raised: Entrapment

Used only by defendant to avoid conviction

Cannot be held criminally liable for ‘entrapment’

Applies only to law enforcement Even then, most legal authorities consider

Honeynets non-entrapment

Page 14: Honeypots

Issues Raised: Liability

You may be liable if your Honeynet system is used to attack or damage other non-Honeynet systems.– Decided at state level, not federal– Civil issue, not criminal

Page 15: Honeypots

Resources

http://www.spitzner.net/