anti honeypot technology
play

Anti-Honeypot Technology Thorsten Holz Laboratory for Dependable - PowerPoint PPT Presentation

Dependable Distributed Systems Anti-Honeypot Technology Thorsten Holz Laboratory for Dependable Distributed Systems holz@i4.informatik.rwth-aachen.de Thorsten Holz Laboratory for Dependable Distributed Systems 21st Chaos Communication


  1. Dependable Distributed Systems Anti-Honeypot Technology Thorsten Holz Laboratory for Dependable Distributed Systems holz@i4.informatik.rwth-aachen.de Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #1

  2. Overview 1. Brief introduction to honeypot technology ● Overview 2. NoSEBrEaK Honeypot Technology • Workings of Sebek NoSEBrEaK Detecting Other Honeypot Architectures • Detecting & disabling Sebek Conclusion • Kebes • Other anti-Sebek techniques 3. Detecting other honeypot architectures • VMware-based honeypots • UML-based honeypots • Others Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #2

  3. Who we are ■ Laboratory for Dependable Distributed ● Overview Systems at RWTH Aachen University Honeypot Technology ■ Main interests: NoSEBrEaK Detecting Other Honeypot • Theoretical considerations of security (safety Architectures Conclusion / liveness / information flow properties, theoretical models of secure systems) • Threats in communication networks (honeypots, . . . ) • Trusted Computing ■ Summer School “Applied IT-security” ■ “Hacker lab” & “Hacker seminar” http://www-i4.informatik.rwth-aachen.de/lufg Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #3

  4. Honeypot Technology Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #4

  5. "Suppose," he [Winnie the Pooh] said to Piglet, "you wanted to catch me, how would you do it?" ● Overview Honeypot Technology "Well," said Piglet, "I should do it like this: I should make a NoSEBrEaK trap, and I should put a jar of honey in the trap, and you would Detecting Other Honeypot smell it, and you would go in after it, and . . . " Architectures Conclusion A. A. Milne: Winnie the Pooh Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #5

  6. Honeypots? ■ Electronic bait, i.e. network resources (e.g. ● Overview computers, routers, switches, . . . ) deployed to Honeypot Technology be probed, attacked and compromised NoSEBrEaK Detecting Other Honeypot ■ “Learn the tools, tactics, and motives of the Architectures Conclusion blackhat community and share these lessons learned” ■ Monitoring software permanently collects data, helps in post-incident forensics ■ Clifford Stoll: The Cuckoo’s Egg , 1988 ■ Honeynet Project: Non-profit research organization of security professionals dedicated to information security Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #6

  7. Global Honeynet Project ● Overview Honeypot Technology NoSEBrEaK ■ Development of tools, for example monitoring Detecting Other Honeypot Architectures software like Sebek or software for data Conclusion analysis ■ Experiences up to now: • Capturing of exploits and tools, e.g. exploit for known vulnerability ( dtspcd , 2002) • Typical approach of attackers • Monitoring of conversations over IRC Botnets, organized card fraud, . . . Further information: honeynet.org Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #7

  8. Building Blocks: Sebek ■ Kernel-module on Linux & Solaris, patch on ● Overview OpenBSD / NetBSD, device driver for Window$ Honeypot Technology ■ Tries to capture all activities of an attacker NoSEBrEaK Detecting Other Honeypot ■ Hijacks sys_read (access to SSH sessions, Architectures Conclusion burneye -protected programs, . . . ) ■ Direct communication to ethernet driver, therefore mostly stealth ■ Unlinking from module list to hide its presence Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #8

  9. Building Blocks: Honeywall ■ Transparent bridge, used for data capture and ● Overview data control Honeypot Technology ■ IDS snort / IPS snort_inline (now part of NoSEBrEaK Detecting Other Honeypot snort ) Architectures Conclusion alert ip $HONEYNET any -> $EXTERNAL_NET any (msg:"SHELLCODE x86 stealth NOOP"; rev:6; sid:651; content:"|EB 02 EB 02 EB 02|"; replace:"|24 00 99 DE 6C 3E|";) ■ netfilter / iptables for traffic limiting ■ Further monitoring • monit or supervise • swatch Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #9

  10. Setup at German Honeynet Project ● Overview Honeypot Technology NoSEBrEaK Detecting Other Honeypot Architectures Conclusion Official website Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #10

  11. NoSEBrEaK Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #11

  12. NoSEBrEaK ■ We had no attacks on our honeynet, so . . . ● Overview ■ Toolkit written in Python 2.3 to detect and Honeypot Technology remove Sebek from honeypot NoSEBrEaK ● Introduction ● Detection ■ Work together with Maximillian Dornseif and ● Avoid Logging ● Kebes ● Other Techniques Christian N. Klein Detecting Other Honeypot Architectures ■ Presented as academic paper at 5th IEEE Conclusion Information Assurance Workshop, Westpoint Available at arXiv as cs.CR/0406052 ■ Get the source code at md.hudora.de ■ Now: Short presentation of our results Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #12

  13. Sebek [...] monitoring capability to all activity on the ● Overview honeypot including, but not limited to, keystrokes. Honeypot Technology If a file is copied to the honeypot, Sebek will see NoSEBrEaK ● Introduction and record the file, producing an identical copy. If ● Detection ● Avoid Logging ● Kebes the intruder fires up an IRC or mail client, Sebek ● Other Techniques will see those messages. [...] Sebek also provides Detecting Other Honeypot Architectures the ability to monitor the internal workings of the Conclusion honeypot in a glass-box manner, as compared to the previous black-box techniques. [...] intruders can detect and disable Sebek. Fortunately, by the time Sebek has been disabled, the code associated with the technique and a record of the disabling action has been sent to the collection server. Know Your Enemy: Sebek Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #13

  14. Workings of Sebek in short Concentrate on Sebek version 2.1.7 for Linux, ● Overview techniques are applicable for other Sebek Honeypot Technology versions NoSEBrEaK ● Introduction ● Detection Basic mechanism of Sebek and interesting ● Avoid Logging ● Kebes ● Other Techniques points for attack: Detecting Other Honeypot Architectures ■ Hijack sys_read() Conclusion ■ Send data passing through sys_read() in covert manner over the network ■ Overwrites part of the network stack ( packet_recvmsg ) to hide Sebek data passing on to the network Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #14

  15. Hiding of Sebek ■ Sebek loads as a kernel module ● Overview ■ Afterwards cleaner.o (part of adore ) is Honeypot Technology loaded which removes Sebek from modules list NoSEBrEaK ● Introduction ● Detection ● Avoid Logging ● Kebes From cleaner.o ● Other Techniques Detecting Other Honeypot if (__this_module.next) Architectures __this_module.next = __this_module.next->next; Conclusion This works because kernel maintains list of modules ( sys_create_module() ) spin_lock_irqsave(&modlist_lock, flags); mod->next = module_list; module_list = mod; /* link it in */ spin_unlock_irqrestore(&modlist_lock, flags); Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #15

  16. Detecting Sebek Several ways to detect Sebek come to mind: ■ Latency ● Overview Honeypot Technology ■ Network traffic counters NoSEBrEaK ● Introduction ● Detection ■ Modification of sys-call table ● Avoid Logging ● Kebes ● Other Techniques ■ Finding hidden module Detecting Other Honeypot Architectures ■ Other cruft in memory Conclusion Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #16

  17. Setup Setup in movies: ■ Attacker compromised one of the honeypots ● Overview Honeypot Technology ■ SSH-connection from attacker to honeypot NoSEBrEaK ● Introduction ● Detection ( ≈ 1 KB/s data) ● Avoid Logging ● Kebes ● Other Techniques ■ Movies show view of an attacker Detecting Other Honeypot Architectures Conclusion Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #17

  18. Latency First detection method we found during tests: ● Overview “ dd-attack ” Honeypot Technology NoSEBrEaK ● Introduction ● Detection $ dd if=/dev/zero of=/dev/null bs=1 ● Avoid Logging ● Kebes ● Other Techniques Just call sys_read() a couple of thousand Detecting Other Honeypot Architectures times per second. . . Conclusion Movie: dd.mov Thorsten Holz – Laboratory for Dependable Distributed Systems 21st Chaos Communication Congress - slide #18

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend