Honeypot technologies 2006 First Conference / tutorial Junes 2006 - - PowerPoint PPT Presentation

honeypot technologies
SMART_READER_LITE
LIVE PREVIEW

Honeypot technologies 2006 First Conference / tutorial Junes 2006 - - PowerPoint PPT Presentation

Honeypot technologies 2006 First Conference / tutorial Junes 2006 {Franck.Veysset,Laurent.Butti}@orange-ft.com D1 -June 2006 Agenda s Origins and background s Different kinds of honeypot Q High interaction honeypots Q Low interaction honeypots


slide-1
SLIDE 1

D1 -June 2006

Honeypot technologies

2006 First Conference / tutorial

Junes 2006

{Franck.Veysset,Laurent.Butti}@orange-ft.com

slide-2
SLIDE 2

France Télécom R&D – Veysset & Butti – June 2006

D2

Agenda

s Origins and background s Different kinds of honeypot

QHigh interaction honeypots QLow interaction honeypots

s Example: honeyd s Other kinds of honeypot

QWiFi honeypot QHoneypot and worms QHoneyclient / honeytoken QDistributed honeypot

s Conclusion...

slide-3
SLIDE 3

France Télécom R&D – Veysset & Butti – June 2006

D3

Why Honeypots?

s FIRST 2005

QA Distributed Intrusion Alert System, by Chih-Yao Lin, Taiwan

National Computer Emergency Response Team, Taiwan

QA National Early Warning Capability Based on a Network of

Distributed Honeypots – Detailed Synthesis, by Cristine Hoepers, NBSO/Brazilian CERT, Brazil

s FIRST 2006

QWednesday and Friday sessions

– The impact of honeynets for CSIRTs – Automated Extraction of Threat Signatures from Network Flows – A Distributed Intrusion Detection System Based on Passive Sensors – Time signatures to detect multi-headed stealthy attack tools

Qand probably more presentations where results come from

honeypot…

slide-4
SLIDE 4

France Télécom R&D – Veysset & Butti – June 2006

D4

1986 1991 1992 1999 2001 2004 The Cuckoo’s Egg, Cliff Stoll There be dragons, Steve Bellovin An Evening with Berferd, Bill Checwick Honeywall The honeynet Project Internet Storm Center, SANS

Origins

slide-5
SLIDE 5

France Télécom R&D – Veysset & Butti – June 2006

D5

The Cuckoo’s egg

s Cliff Stoll, 1986 s ISBN: 0743411463

slide-6
SLIDE 6

France Télécom R&D – Veysset & Butti – June 2006

D6

Idea: to learn the tools and motives of BH

s To learn the tools, tactics, and motives of the

blackhat community, and share the lessons learned

s know your enemies

QSun Tzu was a Chinese military tactician who wrote

2500 years ago, 兵法, (The Art of War)

Q"know yourself and know your enemy, and of a hundred

battles you will have a hundred victories."

slide-7
SLIDE 7

France Télécom R&D – Veysset & Butti – June 2006

D7

Network observatory

s Looking at the internet “background noise”

QUsually relies on distributed sensors QProvided an overview on current threats across the internet

sSome examples

Qhttp://www.dshield.org , http://isc.sans.org (SANS), ISC (Internet

Storm Center)

Qhttp://xforce.iss.net ISS XForce Alertcon (X-Force™ Threat Analysis

Service)

Qhttp://www.mynetwatchman.com/ (firewall log analysis)

slide-8
SLIDE 8

France Télécom R&D – Veysset & Butti – June 2006

D8

Dshield

slide-9
SLIDE 9

France Télécom R&D – Veysset & Butti – June 2006

D9

Survival time ! (SANS)

slide-10
SLIDE 10

France Télécom R&D – Veysset & Butti – June 2006

D10

Top 10 Target Ports

slide-11
SLIDE 11

France Télécom R&D – Veysset & Butti – June 2006

D11

Darknet & Network Telescope

s A Darknet is a portion of routed, allocated IP space in

which no active services or servers reside

s It include one server (packet vacuum)

QGathers the packets and flows that enter the Darknet QAny packet that enters a Darknet is by its presence aberrant QNetflow analysis (and more…)

s Example: CAIDA, Team Cymru, Arbor…

slide-12
SLIDE 12

France Télécom R&D – Veysset & Butti – June 2006

D12

Honeypot Principles (1/2)

sHoneypot is not a production system

Q Every flow going to (or coming from) this system is suspicious by

nature.

Q This makes the analysis of collected data much easier. Q The trap must be well done in order to collect useful and interesting

data.

Q At the same time, the trap must be difficult to recognize by a

potential hacker.

slide-13
SLIDE 13

France Télécom R&D – Veysset & Butti – June 2006

D13

Honeypot Principles (2/2)

s The honeypot can be « hidden » amongst production systems

Q This allows to identify easily actions brought against these systems

s The honeypot can be isolated on a DMZ

Q This will allow to unmask « curious people » who are too interested by the

equipments on the DMZ

s The honeypot can be implemented on the Intranet

Q Behaviors can be analyzed…

s And why not a honeypot « Wireless / 802.11b » ? s The system that will be chosen depends on the objectives

slide-14
SLIDE 14

France Télécom R&D – Veysset & Butti – June 2006

D14

Stakes

s Pros

Q Collected data are on principle interesting Q Few « false positive » / « false negative » Q High value data

s Cons

Q Incurred risks when using such a system

– Bounce: a hacker may attack another site from the honeypot – Provocation: a hacker may feel « provoked » and « avenge »

Q Important resources needed to operate such a system

– Skills, time – But results can be mutualized

slide-15
SLIDE 15

France Télécom R&D – Veysset & Butti – June 2006

D15

Objectives

s In the research field

Q Knowing trends in the attacks domain Q Knowing one’s enemies Q Catch next tools (worm…)

s In order to make the environment more

secure

Q Detection of new attacks

s In order to get prepared in case of attacks on

  • perational networks

s And in order to learn how to protect oneself

slide-16
SLIDE 16

France Télécom R&D – Veysset & Butti – June 2006

D16

In a nutshell (honeynet project)

s A honeypot is an information system resource whose

value lies in unauthorized or illicit use of that resource

s Has no production value, anything going to or from a

honeypot is likely a probe, attack or compromise

s Primary value to most organizations is information

slide-17
SLIDE 17

France Télécom R&D – Veysset & Butti – June 2006

D17

From Wikipedia…

A honeypot honeypot is a trap set to detect or deflect attempts at unauthorized use of information systems. Generally it consists of a computer, data or a network site that appears to be part of a network but which is actually isolated and protected, and which seems to contain information that would be of value to attackers.

slide-18
SLIDE 18

France Télécom R&D – Veysset & Butti – June 2006

D18

Different family of honeypot

s Two distinct types s Low interaction

QAnd low risk QUsed to produce statistics on attacks

s High interaction

QUsually know as “research” QMany possibilities

slide-19
SLIDE 19

France Télécom R&D – Veysset & Butti – June 2006

D19

Low Interaction

s Emulate services, networks & fingerprints s Log all interaction s Honeyd is widely used to build low interaction HP

Fake service

OS

Hacker

HD Fake OS

Fake service Fake service

slide-20
SLIDE 20

France Télécom R&D – Veysset & Butti – June 2006

D20

High Interaction

s Allow full access to services and OS s Ability to capture “0-day attacks” s May be risky…

service

OS

Hacker

HD

service Service

slide-21
SLIDE 21

France Télécom R&D – Veysset & Butti – June 2006

D21

Some honeypot softwares

s Low interaction HP

QBackOfficer Friendly (BOF) – NFR Security

– http://www.nfr.com/products/bof/overview.shtml

QKFSensor – KeyFocus Ltd

– http://www.keyfocus.net/kfsensor/index.php

QDeception Toolkit (DTK) – Fred Cohen & Associates

– http://www.all.net/dtk/index.html

QSee http://www.honeypots.net/honeypots/products

slide-22
SLIDE 22

France Télécom R&D – Veysset & Butti – June 2006

D22

BackOfficerFriendly…

slide-23
SLIDE 23

France Télécom R&D – Veysset & Butti – June 2006

D23

KeyFocus…

slide-24
SLIDE 24

France Télécom R&D – Veysset & Butti – June 2006

D24

Specter

slide-25
SLIDE 25

France Télécom R&D – Veysset & Butti – June 2006

D25

Honeyd

s Written by Niels Provos in 2002 s Low interaction virtual HP s Released under GPL s v1.5a available at www.honeyd.org s Simulates boxes on unused IP space

(with ARPd)

QOses QServices QNetwork topology

slide-26
SLIDE 26

France Télécom R&D – Veysset & Butti – June 2006

D26

Hacker

Honeyd – fake services

Honeyd

echo "220 intranet ESMTP Sendmail 8.1" while read data { if data ~ "HELO" then … if data ~ "MAIL FROM” then … … } 250 intranet … HELO first.org HELO volt.com 250 intranet …

stdout stdin

slide-27
SLIDE 27

France Télécom R&D – Veysset & Butti – June 2006

D27

Honeyd – architecture

slide-28
SLIDE 28

France Télécom R&D – Veysset & Butti – June 2006

D28

Honeyd – accounting

s Two levels

QNetwork packets

– Done by Honeyd daemon – Information on packet headers (no payload)

QService level

– Done in service scripts

slide-29
SLIDE 29

France Télécom R&D – Veysset & Butti – June 2006

D29

Honeyd – Advanced architecture (1/2)

Windows NT 4.0 Server SP5-SP6 misery (10.0.0.8) Linux 2.4.16 - 2.4.18 dns1 (10.0.0.4) dns2 (10.0.0.5)

10.0.0.2 (honeyd does not manage its own IP)

Virtual Honeypots

Honeyd 10.0.0.0/8

Cisco IOS 11.3 - 12.0(11) Windows 98 10.0.0.x

10.0.1.0/24 Windows 98 Attacker 10.0.0.5 Default route 10.0.0.1 (cisco_0.example.edu) Arpd 10.0.0.0/8 (spoofing ARP)

cisco_0 (10.0.0.1)

DNS domain: example.edu

Windows NT 4.0 Server SP5-SP6 matrix (10.0.2.9) cisco_1 (10.0.1.1) Windows NT 4.0 Server SP5-SP6 shining (10.0.1.7) cisco_2 (10.0.2.1) cisco_3 (10.0.3.1) Linux 2.4.16 - 2.4.18 smtp1 (10.0.0.6) smtp2 (10.0.0.7)

10.0.3.0/24 Windows 98 10.0.2.0/24 Windows 98

slide-30
SLIDE 30

France Télécom R&D – Veysset & Butti – June 2006

D30

Honeyd – Advanced architecture (2/2)

s Honeyd.conf

Honeyd.conf

Q## Honeyd configuration file ## Q### Default computers Qcreate default Qset default personality "Windows 98" Qset default default tcp action reset Qset default default udp action reset Qadd default tcp port 139 open Qadd default tcp port 137 open Qadd default udp port 137 open Qadd default udp port 135 open Qset default uptime 398976 Q### Windows computers Qcreate windows Qset windows personality "Windows NT 4.0 Server SP5-SP6" Qset windows default tcp action reset Qset windows default udp action reset Qadd windows tcp port 80 "perl scripts/iis-0.95/iisemul8.pl" Qadd windows tcp port 139 open Qadd windows tcp port 137 open Qadd windows udp port 137 open Qadd windows udp port 135 open Qset windows uptime 3284460 Qbind 10.0.0.8 windows Qbind 10.0.1.9 windows Qbind 10.0.2.10 windows Q### Linux 2.4.x computer Qcreate dns_server Qset dns_server personality "Linux 2.4.7 (X86)" Qset dns_server default tcp action reset Qset dns_server default udp action reset Qadd dns_server udp port 53 "perl scripts/HoneyDNS.pl -

udp"

Qadd dns_server tcp port 21 "sh scripts/ftp.sh" Qset dns_server uptime 3284460 Qbind 10.0.0.4 dns_server Qbind 10.0.0.5 dns_server Q### Linux 2.4.x computer Qcreate smtp_server Qset smtp_server personality "Linux 2.4.7 (X86)" Qset smtp_server default tcp action reset Qset smtp_server default udp action reset Qadd smtp_server tcp port 110 "sh scripts/pop3.sh" Qadd smtp_server tcp port 25 "sh scripts/smtp.sh" Qadd smtp_server tcp port 21 "sh scripts/ftp.sh" Qadd smtp_server tcp port 23 "perl scripts/router-telnet.pl" Qset smtp_server uptime 3284460 Qbind 10.0.0.6 smtp_server Qbind 10.0.0.7 smtp_server Q# Cisco router Qcreate router Qset router personality "Cisco IOS 11.3 - 12.0(11)" Qset router default tcp action reset Qset router default udp action reset Qadd router tcp port 23 "/usr/bin/perl scripts/router-

telnet.pl"

Qset router uid 32767 gid 32767 Qset router uptime 1327650 Qbind 10.0.0.1 router Qbind 10.0.1.1 router Qbind 10.0.2.1 router Qbind 10.0.3.1 router Q### Routing configuration Qroute entry 10.0.0.1 Qroute 10.0.0.1 link 10.0.0.0/24 Qroute 10.0.0.1 add net 10.0.1.0/24 10.0.1.1 latency 55ms

loss 0.1

Qroute 10.0.0.1 add net 10.0.2.0/24 10.0.2.1 latency 15ms

loss 0.01

Qroute 10.0.0.1 add net 10.0.3.0/24 10.0.3.1 latency 105ms

loss 0.2

Qroute 10.0.1.1 link 10.0.1.0/24 Qroute 10.0.2.1 link 10.0.2.0/24 Qroute 10.0.3.1 link 10.0.3.0/24

slide-31
SLIDE 31

France Télécom R&D – Veysset & Butti – June 2006

D31

Honeyd

slide-32
SLIDE 32

France Télécom R&D – Veysset & Butti – June 2006

D32

Honeyd – advanced features

s Subsystem virtualization

QRun real UNIX applications under virtual Honeyd IP addresses: web

servers, ftp servers, etc...

s Internal Web server for easy satistics… s Management console that allows dynamic change on

Honeyd configuration while Honeyd is running

s Dynamic templates

QAllows the configuration of a host to adapt depending on the

  • perating system of the remote host, the time of day, the source IP

address, etc.

s Tarpit s Passive fingerprintings (p0f)

slide-33
SLIDE 33

France Télécom R&D – Veysset & Butti – June 2006

D33

Feedback: Sasser detection (1/2)

s Sasser was seen for the first time on Saturday, May 1st

2004 from 7:50 pm (FTR&D Intranet)

s Number of hits per day

Hits 500 1000 1500 2000 2500 3000 3500 4000 4500 5000 D a t e 3 / 4 / 2 4 1 / 5 / 2 4 2 / 5 / 2 4 3 / 5 / 2 5 4 / 5 / 2 4 5 / 5 / 2 4 6 / 5 / 2 4 7 / 5 / 2 4 8 / 5 / 2 4 9 / 5 / 2 4 1 / 5 / 2 4 1 1 / 5 / 2 4 1 2 / 5 / 2 4 1 3 / 5 / 2 4 1 4 / 5 / 2 4 1 5 / 5 / 2 4 1 6 / 5 / 2 4 Hits

slide-34
SLIDE 34

France Télécom R&D – Veysset & Butti – June 2006

D34

Sasser detection (2/2)

s Maximum of activity on Sunday, May 2nd s Thousands of hits on May 2nd, 3rd and 4th

Q This does not mean thousands of machines were infected Q In fact, 387 unique IP addresses were found (FTR&D site)

s The worm was quickly brought down: 2 working days

Q Monday and Tuesday following the infection

slide-35
SLIDE 35

France Télécom R&D – Veysset & Butti – June 2006

D35

Honeyd: limitation

s As a « low interaction » honeypot, there are some

limitations QDifficult to emulate complex (binaries) protocols QIt is possible to « fingerprint » honeyd, thus identify the honeypot

s Stability issues

QUnder heavy load…

s Security issues

Q?

slide-36
SLIDE 36

France Télécom R&D – Veysset & Butti – June 2006

D36

High interaction HP

s Lots of work in this area s Different generations

QGen1

1999-2002

QGen2 2002-2004 QGen3

2005-…

Q…

s Towards honeynet (networks of honeypots)

slide-37
SLIDE 37

France Télécom R&D – Veysset & Butti – June 2006

D37

Key points

s Strong needs to take care of incoming and outgoing

traffic

s Data Control

QFilter outgoing packets to stop further attacks

s Data capture

QLog every packet that enters and leaves honeypot

slide-38
SLIDE 38

France Télécom R&D – Veysset & Butti – June 2006

D38

No “Data Control”

Internet No Restrictions No Restrictions Honeypot Honeypot

slide-39
SLIDE 39

France Télécom R&D – Veysset & Butti – June 2006

D39

Data Control enabled

slide-40
SLIDE 40

France Télécom R&D – Veysset & Butti – June 2006

D40

GEN I honeynet

slide-41
SLIDE 41

France Télécom R&D – Veysset & Butti – June 2006

D41

GEN I honeynet

s Controls outbound packets by passing through firewall

and router

s Router somehow « hide » the firewall s Data control is performed by the firewall

QFirewall keeps track of number of outbound connections QThe more outbound activity allowed, the more can be learned QMight be risky!

s Data capture

QThe IDS gather all the information QAll systems export their logs to remote syslog server

slide-42
SLIDE 42

France Télécom R&D – Veysset & Butti – June 2006

D42

GEN I: analysis

s The first « honeypot » solution s Data Control is quite hard to perform

QNeed to filter on outbound activity (counter?) QHackers can detect the trick QDifficult to fine tune

s Data Capture is limited

QOnly IDS and Syslog

s Introducing GEN II architectures

slide-43
SLIDE 43

France Télécom R&D – Veysset & Butti – June 2006

D43

Honeynet - GenII

slide-44
SLIDE 44

France Télécom R&D – Veysset & Butti – June 2006

D44

Gen II analysis (1/2)

s Gateway works at layer 2 (bridge mode)

QVery stealthy

s Administration is performed using C interface s Data Control & Data capture are done by the

gateway (honeynet sensor)

slide-45
SLIDE 45

France Télécom R&D – Veysset & Butti – June 2006

D45

Gen II analysis (2/2)

s Advanced data control functionalities

QIDS/IPS functionalities QRelies on SNORT-INLINE Qhttp://snort-inline.sourceforge.net

s Advanced data capture functionalities

QHoneywall gathers firewall and snort logs QSebek runs on all honeypot QHoneywall collects sebek logs

slide-46
SLIDE 46

France Télécom R&D – Veysset & Butti – June 2006

D46

Snort-Inline Drop Rule

Management

Kernel Space

modprobe ip_queue iptables -A OUTPUT -p icmp -j QUEUE Iptables-1.2.7a Ip_queue

User Space

Snort-Inline Snort Rules = Drop DROP

snort –Q –c /snort.conf

slide-47
SLIDE 47

France Télécom R&D – Veysset & Butti – June 2006

D47

Snort-Inline Drop Rule

Exemple: DNS attack

drop tcp $HOME_NET any $EXTERNAL_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh";

slide-48
SLIDE 48

France Télécom R&D – Veysset & Butti – June 2006

D48

Snort-Inline Replace Mode

Management

Kernel Space

modprobe ip_queue iptables -A OUTPUT -p icmp -j QUEUE Iptables-1.2.7a Ip_queue

User Space

Snort-Inline Snort Rules = Replace Internet /bin/sh /ben/sh

slide-49
SLIDE 49

France Télécom R&D – Veysset & Butti – June 2006

D49

Snort-Inline Replace Rule

Exemple: DNS attack Can be very “stealth”

alert tcp $HOME_NET any -> $EXTERNAL_NET 53 (msg:"DNS EXPLOIT named";flags: A+; content:"|CD80 E8D7 FFFFFF|/bin/sh"; replace:"|0000 E8D7 FFFFFF|/ben/sh";)

slide-50
SLIDE 50

France Télécom R&D – Veysset & Butti – June 2006

D50

slide-51
SLIDE 51

France Télécom R&D – Veysset & Butti – June 2006

D51

Data Capture: Sebek

s Tool developed by the honeynet project s Very useful for “data capture”

QHidden kernel module that captures all activity QDumps activity to the network QAttackers cannot sniff any traffic based on magic number

and destination port

s http://www.honeynet.org/tools/sebek/

slide-52
SLIDE 52

France Télécom R&D – Veysset & Butti – June 2006

D52

Sebek Diagram

slide-53
SLIDE 53

France Télécom R&D – Veysset & Butti – June 2006

D53

Sebek: Data capture

s The Sebek kernel module collects data passing through

the read() system call Q For example, this captures the intruder’s ssh keystrokes and recovers

scp file transfers.

s Sebek client relies on stealth techniques to hide. This also

harden its detection. First Sebek version was relying on “the adore rootkit” to hide the sebek files and processes from the attacker QSebek : http://www.honeynet.org/papers/honeynet/tools/ QAdore: http://www.team-teso.net/releases.php

slide-54
SLIDE 54

France Télécom R&D – Veysset & Butti – June 2006

D54

Sebek client: Sys_Read hooking

slide-55
SLIDE 55

France Télécom R&D – Veysset & Butti – June 2006

D55

Sebek client

slide-56
SLIDE 56

France Télécom R&D – Veysset & Butti – June 2006

D56

GUI Sebek

slide-57
SLIDE 57

France Télécom R&D – Veysset & Butti – June 2006

D57

Sebek network

slide-58
SLIDE 58

France Télécom R&D – Veysset & Butti – June 2006

D58

Sebek… what’s next

s Lots of work on Sebek and “anti sebek” techniques

QSee Fake Phrack mag #62 for example QKernel module detection QSebek

s New research on the topic

QEuSec 06: Xebek… (more on this later)

slide-59
SLIDE 59

France Télécom R&D – Veysset & Butti – June 2006

D59

Other HP usages

s WiFi Honeypots s Virtual honeypots s Honeypots and Worms s Distributed Honeypots s Honeyclients s Honeypot farms s Honeynet project s Legal issues

slide-60
SLIDE 60

France Télécom R&D – Veysset & Butti – June 2006

D60

Wireless Honeypots

s Wireless technologies are more and more available

QIn corporate networks QIn home networks QIn hot spots Q…

s New technologies such as VoIP/WLAN, UMA (Unlicensed

Mobile Access)… are new ways to circumvent your security policy

s Seems that wireless honeypot could help us in evaluating

these new risks

slide-61
SLIDE 61

France Télécom R&D – Veysset & Butti – June 2006

D61

Wireless Honeypots

s Today, most corporate wireless access are still based

  • n IPsec tunneling

QImplies that Wi-Fi networks are using « Open » mode

s Two options for a « Wireless Honeypot »

QA classic option is a wired honeypot near your IPsec gateway! QAnother option is a fully featured virtual network emulated

reachable from an open wireless access point

slide-62
SLIDE 62

France Télécom R&D – Veysset & Butti – June 2006

D62

Wireless Honeypot?

s Goals

Q Statistics on « Wardriving » Q Knowledge and understanding of hackers’ motivations

– « intelligence » aspects

Q Knowledge of new technologies and tools

– Wi-Fi hacker Toolbox

s Pros

Q Looks like a typical Wi-Fi network Q Level 2 technology: detection of all customers

equipments looking for Wi-Fi networks (even without connection)

slide-63
SLIDE 63

France Télécom R&D – Veysset & Butti – June 2006

D63

Wireless Honeypot

s Based on a real AP, and on a honeyd server emulating a

full network

s All traffic is monitored and captured s Can fool hacker and wardriver

Simulated Network « Honeyd » Serveur Hacker 1 Hacker 2

Access Point «Honeypot »

slide-64
SLIDE 64

France Télécom R&D – Veysset & Butti – June 2006

D64

Wireless Honeypot

s After some experiments…

QMost of the connection are just looking for internet access

(http://www.google.fr)

QMore interesting, many clients do some “automatic” connections

(ex: under Windows XP, auto_connect)

QThis can be very dangerous (information leak, hole on the system…)

slide-65
SLIDE 65

France Télécom R&D – Veysset & Butti – June 2006

D65

s Thanks to Tino H. s His help made the demo possible…

QOne of our laptop died in the plane

Wireless Honeypot

slide-66
SLIDE 66

France Télécom R&D – Veysset & Butti – June 2006

D66

Virtual Honeypots (1/3)

s New “architecture” to build honeynet s Ideas

QRun everything on a single computer QRelies on virtualization technologies

– VMware – Xen – UML (User Mode Linux) – …

slide-67
SLIDE 67

France Télécom R&D – Veysset & Butti – June 2006

D67

Virtual Honeypots (2/3)

s Pros

QReduced cost QEasy to maintain / repair QPortable (honeynet laptop?)

s Cons

QSingle point of failure QNot everything is possible (Cisco on Intel?) QSecurity (strong compartmentalization?) QDetection? Very difficult to hide…

slide-68
SLIDE 68

France Télécom R&D – Veysset & Butti – June 2006

D68

Virtual Honeypots (3/3)

s More information at

Qhttp://www.honeynet.org/papers/virtual/index.html

s New tools available for virtual honeypots ☺

QSee “Xebek” at “EuSecWest/Core06” QSee “VMware fingerprinting counter measures”

– http://honeynet.rstack.org/tools.php

s New tools against “virtual honeypot”

QVMware fingerprinting tools (cf Kostya’s patches) QAnd many more (dtdumper…)

slide-69
SLIDE 69

France Télécom R&D – Veysset & Butti – June 2006

D69

Automated Malware Collection

s Automated malware collection is a new hyped

technique

s Most well-known tools are

QMwcollect QNepenthes QMwcollect and Nepenthes fusion (February, 2006)

s Lots of other techniques are possible

QPCAP capture of compromised hosts for example

slide-70
SLIDE 70

France Télécom R&D – Veysset & Butti – June 2006

D70

Nepenthes Operation

s Nepenthes is a medium interaction honeypot

QIt emulates known vulnerabilities QIt catches known shellcodes QIt interprets the shellcode actions QIt emulates the actions

– Bind a shell, parses URLs…

s Should not be compromised if no security

vulnerabilities (coded in C++) ;-)

s But can be easily detected, that’s not its purpose!

slide-71
SLIDE 71

France Télécom R&D – Veysset & Butti – June 2006

D71

Nepenthes Loading

s Loading of the configuration

QExamine the modules to be charged (vuln, shellcodes, download,

submit, log)

QRecord the handlers of download for each supported protocol of

download (csend, creseive, ftp, HTTP, link, blink, tftp, CCP, optix)

Qrecord the manager of DNS QRecord FileSubmit QSockets are binded on all the ports where the known

vulnerabilities (in the form of DialogueFactory) are emulated

QSockets are binded on all the ports where the known

vulnerabilities (in the form of DialogueFactory) are emulated

QLoading of patterns present in 61 known shellcodes QBe unaware of 17 ranges of IP addresses

slide-72
SLIDE 72

France Télécom R&D – Veysset & Butti – June 2006

D72

– Watch ports ("25", // SMTP, "110", // POP3, "143", // IMAP, "220", // IMAP, "465" // POP3 & SSL, "993", //

IMAP & SSL, "995" // POP3 & SSL)

–Bagle port 2745 –Dameware port 6129 –Dcom-vuln ports 135,445,1025 –Vuln-ftp port 21 –vulnIIS port 443 –Kuang2 port 17300 –LSASS port 445 –MSMQ ports: 2103,2105,2107 –MSDTCD ports 1025,3372 –Mssql port 1434 –Mydoom port 3127 –Netbiosname port 139 –NetDDE port 139 –Optixshell port 3140 –PNP port 445 –SasserFTPD ports 5554,1023 –SUb7 port 27347 –UPNP port 5000 –VERITAS port 10000 –Wins vuln port 42 –ASN1 ports: smb:445 iis:80

QIgnoring 0.0.0.0/255.0.0.0 Q10.0.0.0/255.0.0.0 Q14.0.0.0/255.0.0.0 Q39.0.0.0/255.0.0.0 Q127.0.0.0/255.0.0.0 Q128.0.0.0/255.255.0.0 Q169.254.0.0/255.255.0.0 Q172.16.0.0/255.240.0.0 Q191.255.0.0/255.255.0.0 Q192.0.0.0/255.255.255.0 Q192.0.2.0/255.255.255.0 Q192.88.99.0/255.255.255.0 Q192.168.0.0/255.255.0.0 Q198.18.0.0/255.254.0.0 Q223.255.255.0/255.255.255.0 Q224.0.0.0/240.0.0.0 Q240.0.0.0/240.0.0.0

slide-73
SLIDE 73

France Télécom R&D – Veysset & Butti – June 2006

D73

Handling Attacks (1/4)

s Attempt at connection - > Creation of a « Dialogue »

QEmulation of a vulnerability

s Data transmitted per packets to the Dialogues

slide-74
SLIDE 74

France Télécom R&D – Veysset & Butti – June 2006

D74

Handling Attacks (2/4)

Socket receives packet Hexdumps Vuln-Dialogue (== pattern?) Comparison with all shellcodes patterns

gives

Last Stage

match Download If socket closes yes yes no

Close

No more packets Switch off

  • ther

dialogues

  • n same

port N

  • &

& n

  • t

h e r d i a l

  • g

u e

slide-75
SLIDE 75

France Télécom R&D – Veysset & Butti – June 2006

D75

Handling Attacks (3/4)

s Some vulns have no pattern used for a first recognition

QDirect recognition against shellcode or direct action (Kuang2)

s When a vuln Dialogue receives a SCH_DONE Message

from a shellcode identifier QIt gives to the corresponding socket the state

CL_ASSIGN_AND_DONE

– In order the other sockets binded on the same port be dropped

slide-76
SLIDE 76

France Télécom R&D – Veysset & Butti – June 2006

D76

Handling Attacks (4/4)

Comparison with all known shellcodes

Match (xor'd if needed)

Creation of a WinNT shell Dialogue

Giving data (url, host, port)

DownloadManager

If URL still OK

Downloads binary

slide-77
SLIDE 77

France Télécom R&D – Veysset & Butti – June 2006

D77

Collection

s Files can be submitted to

QNepenthes manager to collect QGotek server performs better but requires DB backend (mysql) QNorman sandbox for analysis

s Logs can be submitted to

Q Managers (Prelude) thanks to IDMEF Q Surfnet for web interfacing Q IRC

slide-78
SLIDE 78

France Télécom R&D – Veysset & Butti – June 2006

D78

Nepenthes Conclusions

s Nepenthes is modular, organized around a core s Nepenthes is able to catch new shellcodes on known

vulnerabilities QStored in hexdumps

s Nepenthes is able to catch binaries whose shellcode

is known QStored in binaries

s Statistics are possible by analysing submitted logs

slide-79
SLIDE 79

France Télécom R&D – Veysset & Butti – June 2006

D79

Honeypot and worms

s Idea: as seen before, use a honeypot to detect worm

(ie. System that connect to honeypot automatically)

s Fighting back: launch some counter attack, in order to

clean the offending system

s More information

Qhttp://www.citi.umich.edu/u/provos/honeyd/msblast.html Qhttp://www.rstack.org/oudot/

slide-80
SLIDE 80

France Télécom R&D – Veysset & Butti – June 2006

D80

In detail: Mblast infection

slide-81
SLIDE 81

France Télécom R&D – Veysset & Butti – June 2006

D81

Using honeypot to fight worm

  • 1. The worm connects to the honeypot, on port 135, and

launch its exploit

  • 2. The worm connects on a remote shell (honeypot, port

TCP/4444). Then, the honeypot is able to download the worm code (using TFTP)

  • 3. The honeypot know the IP address of the infected host.

It is able to launch an attack (or simply connect back to port 4444) and clean or shutdown offending host

slide-82
SLIDE 82

France Télécom R&D – Veysset & Butti – June 2006

D82

Honeytokens

s honeypot which is not a computer s Used for

Q Espionage Q Credit card, ssn monitoring Q bank QSpam…

s Two main usages

QDetect information leaking QTracking

slide-83
SLIDE 83

France Télécom R&D – Veysset & Butti – June 2006

D83

Distributed Honeypot

slide-84
SLIDE 84

France Télécom R&D – Veysset & Butti – June 2006

D84

Example : Leurre.com

s Project by Eurecom institute

QThe Eurecom Honeypot Project

– http://www.eurecom.fr/~pouget/projects.htm – http://www.leurrecom.org

s Distributed HP (more than 25 countries, 5 continents) s Project launched 4 years ago s Based on “distributed” honeyd

slide-85
SLIDE 85

France Télécom R&D – Veysset & Butti – June 2006

D85

Information from *leurre.com*

s Thanks to Marc Dacier from Eurecom institute s More information: dacier@eurecom.fr … s See Fabien Pouget & Marc Dacier – Friday 3pm s Extract from a presentation « Applied Computing 2006 »

in spain

slide-86
SLIDE 86

France Télécom R&D – Veysset & Butti – June 2006

D86

35 platforms, 25 countries, 5 continents

slide-87
SLIDE 87

France Télécom R&D – Veysset & Butti – June 2006

D87

In Europe …

slide-88
SLIDE 88

France Télécom R&D – Veysset & Butti – June 2006

D88

Mach0 Windows 98 Workstation Mach1 Windows NT (ftp + web server) Mach2 Redhat 7.3 (ftp server)

V i r t u a l S W I T C H

Experimental Set Up

Internet

Observer (tcpdump)

R e v e r s e F i r e w a l l

slide-89
SLIDE 89

France Télécom R&D – Veysset & Butti – June 2006

D89

Big Picture

sDistinct IP Addresses observed: 989,712 s# of received packets: 41,937,600 s# of emitted packets: 39,911,933 sTCP:

90.93%

sUDP:

0.77%

sICMP:

5,16 %

sOthers: (malformed packets, etc) 3.14%

slide-90
SLIDE 90

France Télécom R&D – Veysset & Butti – June 2006

D90

Observation 3

sAll countries host attackers but some countries host

more than others.

slide-91
SLIDE 91

France Télécom R&D – Veysset & Butti – June 2006

D91

Attacks by country of origin

(Jan 1 2005 until Jan 1 2006)

slide-92
SLIDE 92

France Télécom R&D – Veysset & Butti – June 2006

D92

Observation 4

sThere is a surprising steady decrease of the number

  • f attacks
slide-93
SLIDE 93

France Télécom R&D – Veysset & Butti – June 2006

D93

Attacks by environment

(Jan 1 2005 until Jan 1 2006)

slide-94
SLIDE 94

France Télécom R&D – Veysset & Butti – June 2006

D94

Observation 6

sSome compromised machines are used to scan the whole

Internet

sSome compromised machines take advantage of the data

collected by the first group to launch attacks only against the vulnerable targets.

➔ maintaining black lists of scanners is useless.

slide-95
SLIDE 95

France Télécom R&D – Veysset & Butti – June 2006

D95

The «scanners »:

IP sources probing all 3 virtual machines

(24 months ago)

  • pen

23%

  • pen

52%

  • pen

53% closed 47% closed 77% closed 48% 0% 20% 40% 60% 80% 100% m ach0 m ach1 m ach2

slide-96
SLIDE 96

France Télécom R&D – Veysset & Butti – June 2006

D96

The «attackers »:

IP sources probing only 1 virtual machine

(24 months ago)

  • pen

96%

  • pen

95%

  • pen

97% closed 4% closed 3% closed 5% 0% 20% 40% 60% 80% 100% mach0 mach1 mach2

slide-97
SLIDE 97

France Télécom R&D – Veysset & Butti – June 2006

D97

Observation 7

sThe proportion or attackers vs. scanners has changed

twice over the last 24 months.

sTwo possible explanations:

QCollected data is shared in a more efficient way and, thus, less

scans are required.

QScans are not done sequentially any more but random scans are

instead preferred.

slide-98
SLIDE 98

France Télécom R&D – Veysset & Butti – June 2006

D98

Scanners vs. attackers: evolution

slide-99
SLIDE 99

France Télécom R&D – Veysset & Butti – June 2006

D99

Honeyclient

s Idea: Honeypot client

QDetect malicious web server, IRC net, P2P net… QSurf the web searching for websites that use browser

exploits to install malware on the honeymonkey computer

slide-100
SLIDE 100

France Télécom R&D – Veysset & Butti – June 2006

D100

slide-101
SLIDE 101

France Télécom R&D – Veysset & Butti – June 2006

D101

Honeynet project

s Very active organization

Qhttp://www.honeynet.org/speaking/index.html

s Presentation of the Honeynet project extracted from

Qhttp://www.honeynet.org/speaking/index.html

slide-102
SLIDE 102

France Télécom R&D – Veysset & Butti – June 2006

D102

Honeynet: Problem

How can we defend against an enemy, when we don’t even know who the enemy is?

slide-103
SLIDE 103

France Télécom R&D – Veysset & Butti – June 2006

D103

Honeynet: Mission Statement

To learn the tools, tactics, and motives involved in computer and network attacks, and share the lessons learned.

slide-104
SLIDE 104

France Télécom R&D – Veysset & Butti – June 2006

D104

Honeynet: Our Goal

Improve security of Internet at no cost to the public. QAwareness: Raise awareness of the threats that exist. QInformation: For those already aware, we teach and inform about the

threats.

QResearch: We give organizations the capabilities to learn more on their

  • wn.
slide-105
SLIDE 105

France Télécom R&D – Veysset & Butti – June 2006

D105

Honeynet: Honeynet Project

s Non-profit (501c3) organization with Board of Directors. s Funded by sponsors s Global set of diverse skills and experiences. s Open Source, share all of our research and findings at no cost to the public. s Deploy networks around the world to be hacked. s Everything we capture is happening in the wild. s We have nothing to sell.

slide-106
SLIDE 106

France Télécom R&D – Veysset & Butti – June 2006

D106

Honeynet: Honeynet Research Alliance

Starting in 2002, the Alliance is a forum of organizations around the world actively researching, sharing and deploying honeypot technologies. http://www.honeynet.org/alliance/

slide-107
SLIDE 107

France Télécom R&D – Veysset & Butti – June 2006

D107

Honeynet: Alliance Members

s

South Florida Honeynet Project

s

Georgia Technical Institute

s

Azusa Pacific University

s

USMA Honeynet Project

s

Pakistan Honeynet Project

s

Paladion Networks Honeynet Project (India)

s

Internet Systematics Lab Honeynet Project (Greece)

s

Honeynet.BR (Brazil)

s

UK Honeynet

s

French Honeynet Project

s

Italian Honeynet Project

s

Portugal Honeynet Project

s

German Honeynet Project

s

Spanish Honeynet Project

s

Singapore Honeynet Project

s

China Honeynet Project

s

As it (September 05)

slide-108
SLIDE 108

France Télécom R&D – Veysset & Butti – June 2006

D108

A few word on legal aspects (1/2)

s I am not a lawyer…

Q…but here are some information (apply to France)

s There should be no problem using honeypot s But you should keep in mind…

QProvocation au crimes et délits (art 23L 29/7/1881) (eg Entrapment) QViolation de la correspondance privée du pirate (art 226-15, 226-1

Code Pénal)

QAnother problem: compromised honeypot that launch an attack

against (you, other networks, competitor networks…)

slide-109
SLIDE 109

France Télécom R&D – Veysset & Butti – June 2006

D109

A few word on legal aspects (2/2)

s More information available in…

(chapter 8: legal issues…) Qhttp://www.honeynet.org/book/Chp8.pdf

slide-110
SLIDE 110

France Télécom R&D – Veysset & Butti – June 2006

D110

Conclusions

s Very attractive domain s Still many things to do… a very interesting research

area

s A new tool to fight back against black hat

slide-111
SLIDE 111

France Télécom R&D – Veysset & Butti – June 2006

D111

Further info

s honeynet project web site

Qhttp://www.honeynet.org/

s Honeyd (Niels Provos)

Qhttp://www.honeyd.org

s References on honeypot

Qhttp://www.honeypots.net/

s Leurre.com

Qhttp://www.eurecom.fr/~pouget/projects.htm

s Honeyblog

Qhttp://www.honeyblog.org/

slide-112
SLIDE 112

France Télécom R&D – Veysset & Butti – June 2006

D112

Special greetings…

Leurrecom.org