Top Banner
HONEYPOTS TRACKING HACKERS By Nishesh Bakshi
20
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: HONEY POT

HONEYPOTS

TRACKING HACKERS

By Nishesh Bakshi

Page 2: HONEY POT

A WORD ON SECURITY

“The secret to a good defense is good offense”

- Anonymous

Page 3: HONEY POT

Brief Background

• Who is a Hacker?

– A Hacker is a person who tries to gain unauthorized access to a network.

Page 4: HONEY POT

How a hacker affect a server?

• Steals confidential data.• Imposes someone else.• Causes loss of resources.• Sometimes causes even hardware

loss.

Page 5: HONEY POT

What are the security issues?

• To provide secure connection between the client and the server.

• E.g. email service provided by various web-sites.

Page 6: HONEY POT

How Hackers work

• Gathers information about the server• Chooses the weakest link• Start exploiting that link

Page 7: HONEY POT

How Honeypots work.

Page 8: HONEY POT

Definition of Honeypots

“ A honeypot is a security resource whose value is in being probed, attacked or compromised “

Page 9: HONEY POT

HONEYPOT ?

• HoneyPots are not a single tool but a highly flexible technology.

• HoneyPots come in variety of shapes and sizes.everything from a simple windows system emulating a few services to an entire network of production systems waiting to be hacked !!!

• HoneyPots have a variety of values.everything from a burglar alarm that detects an intruder to a research tool that can be used to study the motives of the black hat community !!!

Page 10: HONEY POT

QUESTIONS ON HPs ?

• What are the different values this unique technology can have? What are the different HoneyPot technologies available today?

• What the advantages and disadvantages of using HoneyPots?

• Are there any deployment and maintenance issues associated with HoneyPots?

• Are all HoneyPots offensive in nature?

Page 11: HONEY POT

IS THIS A HONEYPOT ?

On a network, install a firewall which restricts all outbound traffic. Attackers can get into the network but not use this network to spread out the infection.

Page 12: HONEY POT

CONCERNS

(THE “WHAT-IF” FACTOR)

• What if the attacker is lured into a HoneyPot? He/She will be infuriated by the deception and retaliate against the organisation.

• What if the HoneyPot is misconfigured?

Page 13: HONEY POT

THEN WHY USE HONEYPOTS ?

• At the end of year 2000, the life expectancy of a default installation of Red Hat 6.2 was less than 72 hrs !

• One of the fastest recorded times a HoneyPot was compromised was 15 min. This means that within 15 min of being connected to the internet, the system was found, probed, attacked, and successfully exploited by the attacker! The record for capturing a worm was 90 sec !!

• During an 11 month period (Apr 2000 – Mar 2001), there was a 100% increase in IDS alerts based on Snort.

• In the beginning of 2002, a home network was scanned on an average by three different systems a day.

• The year 2001 saw a 100% increase in reported incidents from 21,756 to 52,658 reported attacks.

Page 14: HONEY POT

WHAT CAN HONEYPOTS DO ?

• Can they capture known attacks ?

• Can they detect unknown attacks ?

Page 15: HONEY POT

ADVANTAGES OF USING HONEYPOTS

• Data Value HoneyPots collect very little data, but they collect is

essentially of very high value.HoneyNet project research group collects less than 1 MB data per day !

• Resources HoneyPots typically donot have problems of resource

exhaustion.

• Simplicity No fancy algorithms to develop. No signature databases to maintain. No rule-bases to misconfigure !

Page 16: HONEY POT

DISADVANTAGES OF HONEYPOTS

• Narrow field of view HoneyPots only see the activity directed against

them.

• Fingerprinting An incorrectly implemented HoneyPot can

identify itself and others of the same kind.

Page 17: HONEY POT

CLASSIFICATION OF HONEYPOTS (1/2)

[Based on level of INTERACTION]Are you hoping to catch the attackers in

action and learn about their tools and tactics?OR

Are you interested in detecting unauthorized activity ?

OR

Are you hoping to capture latest worm for analysis ?

Page 18: HONEY POT

CLASSIFICATION OF HONEYPOTS (2/2)

LEVEL OF WORK TO INSTALL WORK TO DEPLOY INFORMATION LEVEL OF

INTERACTION AND CONFIGURE AND MAINTAIN GATHERING RISK

Low Easy Easy Limited Low

Medium Involved Involved Variable Medium

High Difficult Difficult Extensive High

Page 19: HONEY POT

Conclusion

• Honeypots are good resources for tracing hackers.

• The value of Honeypots is in being Hacked.

• Honeypots have their own pros and cons and this technology is still developing.

Page 20: HONEY POT

REFERENCES

• WWW.SNORT.ORG• WWW.HACKINGEXPOSED.COM• WWW.INFOSECWRITERS.COM• WWW.SECURITYFOCUS.COM• WWW.SANS.ORG• WWW.SPECTER.COM