SlideShare a Scribd company logo
Deceive to Detect: 
Using Canary Honeypots for 
Network Security Monitoring 
Chris Sanders 
Charleston ISSA 
November 2014
Chris Sanders 
• Christian & Husband 
• Kentuckian and South 
Carolinian 
• MS, GSE, et al. 
• Non-Profit Director 
• BBQ Pit Master
Chris Sanders 
“[Practical Packet Analysis] gives you everything you need, step by step, to become 
proficient in packet analysis. I could not find a better book.” 
“[Applied NSM] should be required reading for all intrusion analysts and those 
looking to develop a security monitoring program.” 
– Amazon Reviewers
Outline 
Objectives: 
 Traditional Honeypots 
 Canary Honeypot Architecture 
 Honeypot Platforms 
• Honeyd 
• Kippo 
• Tom’s Honeypot 
• Honeydocs 
“How can I use honeypots as an effective part of my 
detection strategy?”
***Disclaimer*** 
• Tactics in this presentation may be 
controversial, depending on your viewpoint. 
• Only orgs with mature security programs 
should attempt the use of canary honeypots. 
• Any time you invite an attacker to dance, you 
might get your feet stepped on.
Traditional Honeypot Design 
• Intentionally Vulnerable System 
• Designed to Mimic Real Services 
• Easily Compromised
Using Canary Honeypots for Network Security Monitoring
Traditional Honeypot Uses 
• Specific Research Purposes 
• Tracking Unstructured Threats 
– Commodity Malware 
– Opportunistic Attackers 
• Vaguely Useful for Building Basic Threat Intel 
No Current Significant Production Value
How can honeypots be useful for 
operational purposes?
US Information Ops Doctrine 
• US DoD JP 3-13 IO Capabilities* 
– Detect 
– Deny 
– Disrupt 
– Degrade 
– Destroy 
– Deceive 
* More commonly applied as the Cyber Kill Chain
Let’s Take Honeypots Farther…
Kentucky is Coal Country
Coal Mining is Hard
Coal Mining is Dangerous
Canaries for Methane Detection
Enter Canary Honeypots 
• Deceive to Detect 
• Honeypots for 
Detection 
1. Placed Inside the 
Network 
2. Mimic Existing Systems 
3. Detailed Alerting & 
Logging 
Nobody Should Ever Talk to a Honeypot
Making the Case 
• How do you detect a malicious user logging in 
to a Windows system? 
– Multiple Failed Logins 
– Weird External IP Address 
– IP Heuristics and Trending 
• What if the malicious user logs in from 
another compromised system using 
legitimate credentials?
Honeypots in the Attack Life Cycle
Attackers Get Sloppy
High vs. Low Interaction 
• High Interaction... 
– Real Operating 
System 
– Real Services 
– Locked Down 
– Detailed Logging 
• Low Interaction… 
– Software-Based 
– Mimics Real Services 
– Fake Environments 
– Limited Logging 
* Some honeypots call themselves “medium” interaction, but these 
are still basically low interaction.
Exploitable vs. Non-Exploitable 
• Exploitable... 
– Mimic Services 
– Contain 
Vulnerabilities 
– Designed to be 
Compromised 
– Compromises are 
Monitored 
• Non-Exploitable... 
– Mimic Services 
– No Vulnerabilities 
– Any Interaction is 
Monitored
Canary Honeypot Architecture 
1. Identify the Devices or Services to be 
Mimicked 
2. Determine Honeypot Placement 
3. Develop Alerting and Logging Capabilities
Identify Devices/Services to Mimic 
• All About Risk - What is your biggest fear? 
• How would attackers exploit that? 
• Mimic critical services and components. 
– Confidentiality – File Server (SSH?) 
– Integrity – Database Server (SQL?) 
– Availability – Web Server (HTTP?)
Determine Honeypot Placement 
• Close to the Asset Being Mimicked 
• Ability to Transmit Logs 
• Limit Communication of High Interaction 
Honeypots (***IMPORTANT***)
Determine Honeypot Placement (cont.)
Develop Alerting and Logging 
• Logging 
– High Interaction – OS Logs, HIDS 
– Low Interaction – Software Logs 
– Network – PCAP, Flow, etc 
• Alerting 
– IDS Signatures 
– alert tcp any any -> $HONEYPOT 22 
(msg:”Communication with SSH Honeypot”; 
sid:12345; rev:1;)
Honeypot Software
Honeyd 
• The father of honeypots 
• Developed by Neil Provos 10+ years ago 
• Low Interaction 
• Can mimic operating systems and services 
• Capable of spinning up thousands of 
honeypot instances
Honeyd Config 
create default 
set default default tcp action block 
set default default udp action block 
set default default icmp action block 
create ansm_winserver_1 
set ansm_winserver_1 personality “Microsoft Windows 
Server 2003 Standard Edition”
Honeyd Config (cont.) 
add ansm_winserver_1 tcp port 135 open 
add ansm_winserver_1 tcp port 139 open 
add ansm_winserver_1 tcp port 445 open 
set ansm_winserver_1 ethernet “d3:ad:b3:3f:11:11” 
bind 172.16.16.202 ansm_winserver_1
Running Honeyd 
• Running Honeyd 
sudo honeyd –d –f /etc/honeypot/ansm.conf 
• Scan Results
Honeyd Logging
Honeyd Alerting 
alert ip !$TRUSTED_MS_HOSTS any 
->$MS_HONEYPOT_SERVERS [135,139,445] 
(msg:“Attempted Communication with 
Windows Honeypot on MS Ports”; 
sid:5000000; rev:1;)
Extended Service Emulation 
• Emulate an ISS Web Server 
add ansm_winserver_1 tcp port 80 “sh 
/usr/share/honeyd/scripts/win32/ web.sh”
Kippo SSH Honeypot 
• Low Interaction SSH Honeypot 
• Provides a Fake File System 
• Detailed Logging and Replay 
• Written in Python
Kippo Demo
Kippo Alerting 
alert tcp $HONEYPOT_SERVERS $SSH_PORTS ->any any 
(msg:“ET POLICY SSH Server Banner Detected on 
Expected Port – Honeypot System”; flow: from_ 
server,established; content:“SSH-”; offset: 0; 
depth: 4; byte_test: 1,>,48,0,relative; 
byte_test:1,<,51,0,relative; byte_test:1,1⁄ 4,46,1, 
relative; 
reference:url,doc.emergingthreats.net/2001973; 
classtype: misc-activity; sid:2001973; rev:8;) 
alert tcp any any <> $HONEYPOT_SERVERS $SSH_PORTS 
(msg:“ET POLICY SSH session in progress on Expected 
Port – Honeypot System”; threshold: type both, track 
by_src, count 2, seconds 300; 
reference:url,doc.emerging- threats.net/2001978; 
classtype:misc-activity; sid:2001978; rev:7;)
Tom’s Honeypot 
• Developed by Tom Liston of InGuardians 
• Low Interaction Multi-Protocol Honeypot 
• Emulates RDP, VNC, Radmin, MSSQL, SIP 
• Written in Python 
• http://labs.inguardians.com/tomshoneypot
Tom’s Honeypot – RDP
Tom’s Honeypot – More
Honeydocs 
• Documents designed to “phone home” when 
opened. 
• Placed with/near other critical documents 
• Honeydocs should never be opened 
• Provides alerting when documents are 
exfiltrated
Honeydoc Manual Example
Honeydoc Manual Example
Honeydoc Automated Example
MHN: Modern Honey Network 
• Centralized Management 
• Web Interface w/ RESTful API 
• http://threatstream.github.io/mhn/
Conclusion 
• Honeypots aren’t just for research! 
• They can be useful for intrusion detection. 
• Great care should be taken when deploying 
honeypots inside the network perimeter. 
• Multiple useful tools already exist.
Thank You! 
E-Mail: chris@chrissanders.org 
Twitter: @chrissanders88 
Blog: http://www.chrissanders.org 
Book Blog: http://www.appliednsm.com 
Testimony: http://www.chrissanders.org/mytestimony

More Related Content

What's hot (20)

PDF
Threat Hunting Playbook.pdf
laibaarsyila
 
PPT
Port Scanning
amiable_indian
 
PPTX
SIEM : Security Information and Event Management
SHRIYARAI4
 
PDF
Hacking With Nmap - Scanning Techniques
amiable_indian
 
ODP
Honeypot Presentation - Using Honeyd
icanhasfay
 
PDF
Threat Hunting with Splunk Hands-on
Splunk
 
PDF
Siber Tehdit Avcılığı (Threat Hunting)
BGA Cyber Security
 
PPTX
SIEM presentation final
Rizwan S
 
PDF
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
PPTX
Splunk Enterprise Security
Splunk
 
PPTX
The Elastic Stack as a SIEM
John Hubbard
 
PDF
Maturity Model of Security Disciplines
Florian Roth
 
PDF
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
PPTX
Client side attacks using PowerShell
Nikhil Mittal
 
PPTX
Mitre Attack - Credential Dumping - updated.pptx
waizuq
 
PPTX
Security Operation Center Fundamental
Amir Hossein Zargaran
 
PDF
Introduction to red team operations
Sunny Neo
 
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
PPTX
Security Information and Event Management (SIEM)
hardik soni
 
PPTX
Threat Hunting with Splunk
Splunk
 
Threat Hunting Playbook.pdf
laibaarsyila
 
Port Scanning
amiable_indian
 
SIEM : Security Information and Event Management
SHRIYARAI4
 
Hacking With Nmap - Scanning Techniques
amiable_indian
 
Honeypot Presentation - Using Honeyd
icanhasfay
 
Threat Hunting with Splunk Hands-on
Splunk
 
Siber Tehdit Avcılığı (Threat Hunting)
BGA Cyber Security
 
SIEM presentation final
Rizwan S
 
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
Splunk Enterprise Security
Splunk
 
The Elastic Stack as a SIEM
John Hubbard
 
Maturity Model of Security Disciplines
Florian Roth
 
Hunting Lateral Movement in Windows Infrastructure
Sergey Soldatov
 
Client side attacks using PowerShell
Nikhil Mittal
 
Mitre Attack - Credential Dumping - updated.pptx
waizuq
 
Security Operation Center Fundamental
Amir Hossein Zargaran
 
Introduction to red team operations
Sunny Neo
 
Effective Threat Hunting with Tactical Threat Intelligence
Dhruv Majumdar
 
Security Information and Event Management (SIEM)
hardik soni
 
Threat Hunting with Splunk
Splunk
 

Similar to Using Canary Honeypots for Network Security Monitoring (20)

PPT
Honeypot
Akhil Sahajan
 
PPT
Honeypot
Akhil Sahajan
 
PDF
Honeypots for Active Defense
Greg Foss
 
PPT
Anton Chuvakin on Honeypots
Anton Chuvakin
 
PPTX
Honeypots
Rushikesh Kulkarni
 
PPTX
Honeypots and honeynets
Rasool Irfan
 
PPTX
BSA2016 - Honeypots for Network Security Monitoring
chrissanders88
 
PPTX
2018 - Using Honeypots for Network Security Monitoring
chrissanders88
 
PPT
Honeypot honeynet
Sina Manavi
 
PPT
Honey Pot
iradarji
 
PDF
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PROIDEA
 
PDF
Review on Honeypot Security
IRJET Journal
 
PDF
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET Journal
 
PPT
Honeypot
KirtiGoyal25
 
PDF
Honeypot 101 (slide share)
Emil Tan
 
PDF
Olll
nannukaur
 
PPTX
Honeypots.ppt1800363876
Momita Sharma
 
DOCX
Honeypots
Jyoti Nagargoje
 
PPT
Honeypots - Tracking the Blackhat Community
amiable_indian
 
Honeypot
Akhil Sahajan
 
Honeypot
Akhil Sahajan
 
Honeypots for Active Defense
Greg Foss
 
Anton Chuvakin on Honeypots
Anton Chuvakin
 
Honeypots and honeynets
Rasool Irfan
 
BSA2016 - Honeypots for Network Security Monitoring
chrissanders88
 
2018 - Using Honeypots for Network Security Monitoring
chrissanders88
 
Honeypot honeynet
Sina Manavi
 
Honey Pot
iradarji
 
[CONFidence 2016] Leszek Miś - Honey(pot) flavored hunt for cyber enemy
PROIDEA
 
Review on Honeypot Security
IRJET Journal
 
IRJET- A Cloud based Honeynet System for Attack Detection using Machine Learn...
IRJET Journal
 
Honeypot
KirtiGoyal25
 
Honeypot 101 (slide share)
Emil Tan
 
Olll
nannukaur
 
Honeypots.ppt1800363876
Momita Sharma
 
Honeypots
Jyoti Nagargoje
 
Honeypots - Tracking the Blackhat Community
amiable_indian
 
Ad

More from chrissanders88 (11)

PPTX
Hacking Food - BSides Augusta 2017
chrissanders88
 
PPTX
Threats that Matter - Murray State University 2017
chrissanders88
 
PPTX
Art into Science 2017 - Investigation Theory: A Cognitive Approach
chrissanders88
 
PPTX
Abstract Tools for Effective Threat Hunting
chrissanders88
 
PPTX
SOC2016 - The Investigation Labyrinth
chrissanders88
 
PPTX
Minding the Metacognitive Gap - BSides NOLA
chrissanders88
 
PPT
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
chrissanders88
 
PPT
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
chrissanders88
 
PPTX
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88
 
PPT
Applied Detection and Analysis with Flow Data - SO Con 2014
chrissanders88
 
PPT
Developing Analytic Technique and Defeating Cognitive Bias in Security
chrissanders88
 
Hacking Food - BSides Augusta 2017
chrissanders88
 
Threats that Matter - Murray State University 2017
chrissanders88
 
Art into Science 2017 - Investigation Theory: A Cognitive Approach
chrissanders88
 
Abstract Tools for Effective Threat Hunting
chrissanders88
 
SOC2016 - The Investigation Labyrinth
chrissanders88
 
Minding the Metacognitive Gap - BSides NOLA
chrissanders88
 
BSides Augusta 2015 - Building a Better Analyst Using Cognitive Psychology
chrissanders88
 
CISSA Lightning Talk - Building a Malware Analysis Lab on a Budget
chrissanders88
 
Applied Detection and Analysis Using Flow Data - MIRCon 2014
chrissanders88
 
Applied Detection and Analysis with Flow Data - SO Con 2014
chrissanders88
 
Developing Analytic Technique and Defeating Cognitive Bias in Security
chrissanders88
 
Ad

Recently uploaded (20)

PPTX
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
PDF
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
PPTX
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
PDF
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
PDF
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
PDF
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
PDF
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
PPTX
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
PPTX
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
PDF
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
PDF
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
PDF
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
PDF
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
PDF
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
PDF
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
PPTX
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
PDF
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
PDF
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
PDF
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
PDF
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 
"Autonomy of LLM Agents: Current State and Future Prospects", Oles` Petriv
Fwdays
 
Newgen 2022-Forrester Newgen TEI_13 05 2022-The-Total-Economic-Impact-Newgen-...
darshakparmar
 
OpenID AuthZEN - Analyst Briefing July 2025
David Brossard
 
HubSpot Main Hub: A Unified Growth Platform
Jaswinder Singh
 
Newgen Beyond Frankenstein_Build vs Buy_Digital_version.pdf
darshakparmar
 
Agentic AI lifecycle for Enterprise Hyper-Automation
Debmalya Biswas
 
Building Real-Time Digital Twins with IBM Maximo & ArcGIS Indoors
Safe Software
 
COMPARISON OF RASTER ANALYSIS TOOLS OF QGIS AND ARCGIS
Sharanya Sarkar
 
WooCommerce Workshop: Bring Your Laptop
Laura Hartwig
 
From Code to Challenge: Crafting Skill-Based Games That Engage and Reward
aiyshauae
 
HCIP-Data Center Facility Deployment V2.0 Training Material (Without Remarks ...
mcastillo49
 
Reverse Engineering of Security Products: Developing an Advanced Microsoft De...
nwbxhhcyjv
 
Achieving Consistent and Reliable AI Code Generation - Medusa AI
medusaaico
 
LLMs.txt: Easily Control How AI Crawls Your Site
Keploy
 
Presentation - Vibe Coding The Future of Tech
yanuarsinggih1
 
From Sci-Fi to Reality: Exploring AI Evolution
Svetlana Meissner
 
CIFDAQ Weekly Market Wrap for 11th July 2025
CIFDAQ
 
Log-Based Anomaly Detection: Enhancing System Reliability with Machine Learning
Mohammed BEKKOUCHE
 
CIFDAQ Token Spotlight for 9th July 2025
CIFDAQ
 
Fl Studio 24.2.2 Build 4597 Crack for Windows Free Download 2025
faizk77g
 

Using Canary Honeypots for Network Security Monitoring

  • 1. Deceive to Detect: Using Canary Honeypots for Network Security Monitoring Chris Sanders Charleston ISSA November 2014
  • 2. Chris Sanders • Christian & Husband • Kentuckian and South Carolinian • MS, GSE, et al. • Non-Profit Director • BBQ Pit Master
  • 3. Chris Sanders “[Practical Packet Analysis] gives you everything you need, step by step, to become proficient in packet analysis. I could not find a better book.” “[Applied NSM] should be required reading for all intrusion analysts and those looking to develop a security monitoring program.” – Amazon Reviewers
  • 4. Outline Objectives:  Traditional Honeypots  Canary Honeypot Architecture  Honeypot Platforms • Honeyd • Kippo • Tom’s Honeypot • Honeydocs “How can I use honeypots as an effective part of my detection strategy?”
  • 5. ***Disclaimer*** • Tactics in this presentation may be controversial, depending on your viewpoint. • Only orgs with mature security programs should attempt the use of canary honeypots. • Any time you invite an attacker to dance, you might get your feet stepped on.
  • 6. Traditional Honeypot Design • Intentionally Vulnerable System • Designed to Mimic Real Services • Easily Compromised
  • 8. Traditional Honeypot Uses • Specific Research Purposes • Tracking Unstructured Threats – Commodity Malware – Opportunistic Attackers • Vaguely Useful for Building Basic Threat Intel No Current Significant Production Value
  • 9. How can honeypots be useful for operational purposes?
  • 10. US Information Ops Doctrine • US DoD JP 3-13 IO Capabilities* – Detect – Deny – Disrupt – Degrade – Destroy – Deceive * More commonly applied as the Cyber Kill Chain
  • 12. Kentucky is Coal Country
  • 14. Coal Mining is Dangerous
  • 15. Canaries for Methane Detection
  • 16. Enter Canary Honeypots • Deceive to Detect • Honeypots for Detection 1. Placed Inside the Network 2. Mimic Existing Systems 3. Detailed Alerting & Logging Nobody Should Ever Talk to a Honeypot
  • 17. Making the Case • How do you detect a malicious user logging in to a Windows system? – Multiple Failed Logins – Weird External IP Address – IP Heuristics and Trending • What if the malicious user logs in from another compromised system using legitimate credentials?
  • 18. Honeypots in the Attack Life Cycle
  • 20. High vs. Low Interaction • High Interaction... – Real Operating System – Real Services – Locked Down – Detailed Logging • Low Interaction… – Software-Based – Mimics Real Services – Fake Environments – Limited Logging * Some honeypots call themselves “medium” interaction, but these are still basically low interaction.
  • 21. Exploitable vs. Non-Exploitable • Exploitable... – Mimic Services – Contain Vulnerabilities – Designed to be Compromised – Compromises are Monitored • Non-Exploitable... – Mimic Services – No Vulnerabilities – Any Interaction is Monitored
  • 22. Canary Honeypot Architecture 1. Identify the Devices or Services to be Mimicked 2. Determine Honeypot Placement 3. Develop Alerting and Logging Capabilities
  • 23. Identify Devices/Services to Mimic • All About Risk - What is your biggest fear? • How would attackers exploit that? • Mimic critical services and components. – Confidentiality – File Server (SSH?) – Integrity – Database Server (SQL?) – Availability – Web Server (HTTP?)
  • 24. Determine Honeypot Placement • Close to the Asset Being Mimicked • Ability to Transmit Logs • Limit Communication of High Interaction Honeypots (***IMPORTANT***)
  • 26. Develop Alerting and Logging • Logging – High Interaction – OS Logs, HIDS – Low Interaction – Software Logs – Network – PCAP, Flow, etc • Alerting – IDS Signatures – alert tcp any any -> $HONEYPOT 22 (msg:”Communication with SSH Honeypot”; sid:12345; rev:1;)
  • 28. Honeyd • The father of honeypots • Developed by Neil Provos 10+ years ago • Low Interaction • Can mimic operating systems and services • Capable of spinning up thousands of honeypot instances
  • 29. Honeyd Config create default set default default tcp action block set default default udp action block set default default icmp action block create ansm_winserver_1 set ansm_winserver_1 personality “Microsoft Windows Server 2003 Standard Edition”
  • 30. Honeyd Config (cont.) add ansm_winserver_1 tcp port 135 open add ansm_winserver_1 tcp port 139 open add ansm_winserver_1 tcp port 445 open set ansm_winserver_1 ethernet “d3:ad:b3:3f:11:11” bind 172.16.16.202 ansm_winserver_1
  • 31. Running Honeyd • Running Honeyd sudo honeyd –d –f /etc/honeypot/ansm.conf • Scan Results
  • 33. Honeyd Alerting alert ip !$TRUSTED_MS_HOSTS any ->$MS_HONEYPOT_SERVERS [135,139,445] (msg:“Attempted Communication with Windows Honeypot on MS Ports”; sid:5000000; rev:1;)
  • 34. Extended Service Emulation • Emulate an ISS Web Server add ansm_winserver_1 tcp port 80 “sh /usr/share/honeyd/scripts/win32/ web.sh”
  • 35. Kippo SSH Honeypot • Low Interaction SSH Honeypot • Provides a Fake File System • Detailed Logging and Replay • Written in Python
  • 37. Kippo Alerting alert tcp $HONEYPOT_SERVERS $SSH_PORTS ->any any (msg:“ET POLICY SSH Server Banner Detected on Expected Port – Honeypot System”; flow: from_ server,established; content:“SSH-”; offset: 0; depth: 4; byte_test: 1,>,48,0,relative; byte_test:1,<,51,0,relative; byte_test:1,1⁄ 4,46,1, relative; reference:url,doc.emergingthreats.net/2001973; classtype: misc-activity; sid:2001973; rev:8;) alert tcp any any <> $HONEYPOT_SERVERS $SSH_PORTS (msg:“ET POLICY SSH session in progress on Expected Port – Honeypot System”; threshold: type both, track by_src, count 2, seconds 300; reference:url,doc.emerging- threats.net/2001978; classtype:misc-activity; sid:2001978; rev:7;)
  • 38. Tom’s Honeypot • Developed by Tom Liston of InGuardians • Low Interaction Multi-Protocol Honeypot • Emulates RDP, VNC, Radmin, MSSQL, SIP • Written in Python • http://labs.inguardians.com/tomshoneypot
  • 41. Honeydocs • Documents designed to “phone home” when opened. • Placed with/near other critical documents • Honeydocs should never be opened • Provides alerting when documents are exfiltrated
  • 45. MHN: Modern Honey Network • Centralized Management • Web Interface w/ RESTful API • http://threatstream.github.io/mhn/
  • 46. Conclusion • Honeypots aren’t just for research! • They can be useful for intrusion detection. • Great care should be taken when deploying honeypots inside the network perimeter. • Multiple useful tools already exist.
  • 47. Thank You! E-Mail: [email protected] Twitter: @chrissanders88 Blog: http://www.chrissanders.org Book Blog: http://www.appliednsm.com Testimony: http://www.chrissanders.org/mytestimony

Editor's Notes

  • #6: Military distinction story
  • #11: Where do honeypots fit in? Deception?
  • #19: Catching bad guys later in the cycle
  • #22: RDP Honeypot Example
  • #37: Login Demo – 1. ./start.sh 2. ssh root@localhost –p2222 pw:123456 Log Demo – 1. cat /log/kippo.log Replay Demo – 1. utils/playlog.py log/demo.log