Transcript Group 1B

HONEYPOTS
Mathew Benwell , Sunee Holland, Grant Pannell
Introduction

What is a honeypot?


“An information system resource whose
value lies in unauthorized or illicit use of
that resource” (Spitzner 2003)
Types of honeypots



Production – captures limited information,
for mitigating risk, used in a corporate
setting
Research – captures lots of information,
learn about threats, develop better
protection


Prevention – keeping a threat out
Detection – sensing attacks, alerting
admins
Reaction – responding to a threat
Low-interaction, medium-interaction, highinteraction

More detail later on
Honeynets/honeyfarms








VMware
honeyd
Fake APs
Fake web servers
Network services


Honeypot used to collect spam
Usually e-mail addresses that prevent
legitimate use to ensure all use is
illegitimate
Usenet newsgroups lure cross-posted
spam
Virtualisation


Network of real computers, high risk, high
information gain
Spamtraps

Prevention, detection, reaction


Implementations
Production vs. Research



Emulate telnet, FTP, SMTP, POP3, HTTP
Multipurpose solutions

Mantrap, Deception Toolkit, HOACD
Advantages/Disadvantages

Advantages

Data collection





Single point of attack


Less bandwidth or activity than
other security implementations



Less complex than other security
mechanisms such as Intrusion
Detection Systems
Less chance of misconfiguration
Cost


No need for high resource usage
Depends on the application
Have a risk of being exploited –
depends on the type of honeypot
More detail later on
Limited view


Useless if it is not attacked
Risk

Simplicity


Disadvantages
Minimise resource usage


Only captures relevant data
Small data sets
High value

Limited data – only captures what
interacts with it and not the whole
scope of the system
Cost


Deployment costs, analysis costs
Depends on the application
Security & Risks

3 Types of Honeypots Classified by Risk

Low-Interaction


High-Interaction






Software/Operating System Services –
Direct access to data





Can use IDS/Firewall between Hacker and
Honeypot
Log Requests, Connections, Patterns
Lack of monitoring  What happens?
Physical disconnection
DMZs and ACLs (Logical)



Possible Exploitation  Access to OS
Buffer Overruns, etc.
Always Monitor Honeypot
Can help if resources limited
Leaves host intact, runs new OS on top
running OS
Virtualisation software exploitable 
Access to host OS
Secure Honeypot By:
Emulated Software and OS needs to be
up-to-date, hardened


Emulated Services – No requests, only
Connections
Emulated Services – Requests with Faked
Responses
Virtualisation (VMWare, etc.)

Medium-Interaction





Predict hacker entry point
Put honeypot in same zone
ACL to control access between DMZ and
sensitive network
ACL to filter honeypot traffic
Honeypot Compromised?

Identity found – send bogus data


Emulated software not accurate
Exploit emulation/software/OS



Disable Honeypot
Remove Gathered Data
Spam Relay, DoS, Attack Hosts
Legal Issues & Evidence

Types of Evidence

Content


Time, Duration, Protocol, Service, Source,
Destination
Entrapment


May exclude evidence
May not be relevant


Keystrokes, Actions, Requests, Credentials
Transactional



Only applies if public law enforcement
involved
Integrity of Evidence

Identity of Honeypot Compromised 
Bogus Data & Patterns

Not all data sent to honeypot is malicious
 Routine Network Broadcasts

Limited View on Network  May not be
relevant to legitimate hosts

Always log! Checksums, Timestamps

Chain of Custody Documentation

Privacy




Laws against tracking real-time data
Law depends on location of honeypot and
hacker
Production Honeypots – exempt by Service
Provider Protection Law, maybe
Research Honeypots – depends if
Transactional or Content data



Content data more sensitive
Prompt user that all activity is logged?
No certain decision yet (2003)

Preparation, Activities, Shutting Down,
Copying, Analysis
Liability

If compromised, ensure honeypot not used
to attack other hosts or organisations

Hacker liable? Administrator liable?

Yet to have certain decision (2003)

Cannot re-attack hacker, classed as DoS!
Recommendation

VMware - Research

High-Interaction
Easy preservation of
memory contents
 Easy duplication of disk
contents
 System easily restored
 May be less likely to
stand up in court
 Ensure host system is
appropriately secured
 Use host integrity checks
to verify host security


Honeyd - Production

Medium-Interaction
Mimics any service
 Mimics multiple operating
systems
 Not a full operating
system so reduces some
honeypot risks
