Using Honeypots for Security Operations Jim Barlow - - PowerPoint PPT Presentation

using honeypots for security operations
SMART_READER_LITE
LIVE PREVIEW

Using Honeypots for Security Operations Jim Barlow - - PowerPoint PPT Presentation

Using Honeypots for Security Operations Jim Barlow <jbarlow@ncsa.uiuc.edu> Head of Security Operations and Incident Response National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign National


slide-1
SLIDE 1

1

National Center for Supercomputing Applications

Using Honeypots for Security Operations

Jim Barlow

<jbarlow@ncsa.uiuc.edu> Head of Security Operations and Incident Response

National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign

slide-2
SLIDE 2

2

National Center for Supercomputing Applications

Outline

  • Honeypots and why did we start using them?
  • Details on incident involved with
  • Setting one up and honeypot activity
  • What we learned
  • Other areas of application
  • Future work
slide-3
SLIDE 3

3

National Center for Supercomputing Applications

Traditional Honeypots

  • First used for researching blackhat activity
  • Set up a honeypot, see who breaks in
  • Know your enemy papers
slide-4
SLIDE 4

4

National Center for Supercomputing Applications

Why did we set one up?

  • Had incident where we wanted to get specific

intruder on our honeypot to monitor

  • Persistent intruder
  • Generally intruders move to greener pastures

when discovered

slide-5
SLIDE 5

5

National Center for Supercomputing Applications

What did we want to find?

  • Where are they coming from?
  • Where are they going?
  • What tools are they using?
  • What exploits are being used?
  • Motive?
slide-6
SLIDE 6

6

National Center for Supercomputing Applications

More details on incident

  • Miscreants were using trojaned ssh clients to

compromise accounts

  • Would then attempt local exploits
  • Large number of compromised accounts and

machines

  • Tended to use same system to launch attacks for

days or weeks

  • Can we get them to use our system?
slide-7
SLIDE 7

7

National Center for Supercomputing Applications

Setting up honeypot

  • If we build it, will he come?
  • Can be a hard problem, how to get specific

intruder onto our honeypot?

  • Bait and Switch honeypots
  • http://baitnswitch.sourceforge.net/
  • US DoD – Net Force Maneuver
  • We decided to use Sebek from honeynet.org
  • Used their own tool against themselves
  • Use trojaned ssh client to log into honeypot
slide-8
SLIDE 8

8

National Center for Supercomputing Applications

First honeypot activity

  • Fed account into their “collector” using tojaned ssh

client (on compromised machine).

  • Intruders logged into our honeypot within 2 minutes
  • There were no local vulnerabilities on honeypot
  • Session 1 output
slide-9
SLIDE 9

9

National Center for Supercomputing Applications

What did this tell us?

  • Actively using and monitoring passwords collected
  • Specific commands they used
  • Some of what they initially look for
  • ssh host sh -i
  • IP address attacking from
slide-10
SLIDE 10

10

National Center for Supercomputing Applications

Honeypot round 2

  • Second account fed took three hours to log into

system

  • Session 2 output
  • Different command syntax
  • Does that tell us anything?
  • Few more hits over next couple days
slide-11
SLIDE 11

11

National Center for Supercomputing Applications

Additional hits on second hp

  • Spent more time on system around a week later
  • Some interesting information
  • Looking for exported filesystems
  • Targeting our teragrid cluster
  • Download and use of nfsshell tool
  • Session 3 output
slide-12
SLIDE 12

12

National Center for Supercomputing Applications

Third times a charm?

  • Fed account on third honeypot system
  • Knew format of password collector and could feed

accounts at random

  • Compromised machine on our network using scan

and sploit.

  • We were able to see everything they did on the

compromised system.

  • Lots of interesting items discovered
  • Session 4 output
slide-13
SLIDE 13

13

National Center for Supercomputing Applications

Other interesting sessions

  • Started giving them boxes that could be rooted
  • Would they start using the machine more?
  • After getting root
  • Didn't install standard rootkit
  • Installed mod_rootme package
  • Started web server as root
  • OpenSSL led to additional compromise
slide-14
SLIDE 14

14

National Center for Supercomputing Applications

How did this all help us?

  • Categorize vulnerabilities being exploited
  • Identify IP address attacking from
  • Get tools being used
  • How and where they were getting them from
  • ie. uuencoding – thought safe
  • Share all this with trusted community
  • Also created “info file” that could be shared with

newly affected sites

slide-15
SLIDE 15

15

National Center for Supercomputing Applications

What else did this tell us about the miscreant?

  • Strange habit of logging in, out, and back in again
  • Why? More than one person?
  • Once on machine logs onto localhost
  • Changes last login entry
  • Seems all attacks were done manually
  • Occasional special characters typed
  • Foreign character set?
  • Maybe possible to analyze commands to determine if

more than one person

  • Eventually hp not needed (at times)
slide-16
SLIDE 16

16

National Center for Supercomputing Applications

Attack network

Compromised hosts Password collector Route in Outside U.S. Inside U.S. Web server

slide-17
SLIDE 17

17

National Center for Supercomputing Applications

Other areas we are using honeypots

  • SSH brute force logger
  • Logging usernames and passwords for last 9 mo.
  • Create account with one of these common ones

and watch what they do

  • Wash/rinse/repeat
  • Categorize attackers?
  • X server honeypot
  • Remote site with similar name
  • ncsa.teragrid.org vs. ncsa.org
slide-18
SLIDE 18

18

National Center for Supercomputing Applications

Other uses of honeypots/honeytokens

  • Honeytokens/web bugs
  • Bugged email
  • Web page/email archive
  • How long till it's mined off of google?
  • Online forensics from honeypot
  • Needed to access remote machine
  • Log in from ssh password collector
  • Thought compromised host was blocked at border
slide-19
SLIDE 19

19

National Center for Supercomputing Applications

Future Work

  • Distributed honeynet
  • Same username at multiple sites (known_hosts

attack)

slide-20
SLIDE 20

20

National Center for Supercomputing Applications

Questions?

jbarlow@ncsa.uiuc.edu

Gracias