May 2003 CSO Magazine








Sensitive Sorts
Air-born pathogens, industrial toxins, sickness in cattle—all can be spotted by current chemical and biological detection technologies.
Read More

 
You Can Catch More Spies with Honey
Honeypots and honeynets can take the sting out of hacker attacks     BY SIMSON GARFINKEL


TIRED OF DEFENDING against bad guys? Instead, go on the offensive. At least that's the idea behind so-called honeypots—computer systems that are designed to lure evildoers and then record their every move.

Think of honeypots as intelligence collection systems. Many hackers engage in routine scans of the Internet's address space, looking for poorly defended computers. A honeypot is a deliberately vulnerable target that invites penetration while fully instrumented. So after a hacker penetrates it, you can learn how it was done, keeping you current with the latest attacks and exploits against your company's servers. You can also collect the types of hacker tools they use and, by eavesdropping on their communications, map out their social networks.

Setting up a honeypot isn't hard; all you need is a computer running an unpatched copy of Microsoft Windows or Red Hat Linux on your external Internet. Since hackers are likely to booby-trap the computer's logging and auditing capabilities, you'll want to station a network-monitoring system between the box and your Internet connection so that all the traffic in or out of the box is silently recorded. Then just sit back and wait for the inevitable attack.

Running a honeypot is not without its risks, however. That's because the overwhelming number of compromised systems are used for attacking other systems. If you ignore a vulnerable system, you may be liable if hackers use your system to break into others. It's called downstream liability, and it brings us to the topic of honeynets.

A honeynet is a honeypot with added technology that properly records the hacker's actions while simultaneously minimizing or eliminating the risks to others on the Internet. An example is a honeypot that's set up behind a backward firewall; instead of preventing incoming connections, the firewall prevents the honeypot from initiating outbound connections. Still, while that approach makes the honeypot incapable of damaging other systems, it also makes it pretty easy for bad guys to spot. Realizing they've broken into a presumably booby-trapped system, the typical hacker is likely to wipe the disk clean and never return (which is not tremendously informative for the honeypot watchers).

For the past four years, Lance Spitzer and the others at the Honeynet Project have been working to create, deploy, manage and analyze the results of honeynets. Their technology is clever, but their results incredibly disturbing. To solve the problem of downstream liability, Spitzer and his team developed a range of data control techniques—for example, an adaptive firewall rule that allows five or 10 outgoing connections every hour: That's high enough to prevent an attacker from getting suspicious, but low enough to prevent serious damage to third-party systems. These rules can be implemented on commercial firewall systems like those from Check Point Software Technologies or on firewalls built from Linux and OpenBSD systems. Of course, no data control technique is perfect. "The more you allow a blackhat to do outbound, the more you can learn, but the greater the risk," according to the project's website.

Data capture is another technical challenge in running a honeypot. By recording every packet in and out of the system, the honeypot watchers can get a good idea of what the bad guys are doing. The log files on the honeypot itself are also a good data source. The log files are easily deleted by the attacker, so it's common to have the honeypot send a copy of its log to a remote syslog server that's on the same network but is better defended. (Be sure to watch the log server as well. If it is penetrated by your attacker using a novel attack, then your honeypot will certainly have shown its worth.)

The task of data capture has been considerably complicated in recent years by the increased use of encryption in the blackhat community. Back in the 1990s, most bad guys logged in to their compromised systems using clear text-protocols such as telnet and rsh. Today they've followed the advice of numerous computer security professionals and have turned to cryptographic protocols like ssh to make their communications immune to network monitoring. Honeynet's response to encryption is to modify the target computer's operating system so that all keystrokes, transferred files and other information are logged to yet another monitoring system. Because the attacker might discover such logs, the project uses steganographic techniques—hiding keystrokes inside NetBIOS broadcast packets, for example. It's a clever idea. (Unfortunately, it's only a matter of time before the bad guys adapt those techniques to their own nefarious ends.)

One of the nice things about honeypot systems is that they do a great job at data reduction. With a typical website or mail server, attacks are usually drowned out by the legitimate traffic. Adding an intrusion detection system rarely helps because of the tendency of these systems to generate false alarms. Honeypots, on the other hand, have little or no legitimate traffic. Most of the data in or out is, by definition, an attack. As a result, it is much easier to look at the data and find out what the attacker actually did.

Since its formation in 1999, the Honeynet Project has gathered a tremendous amount of information that you can find at www.honeynet.org or in Spitzer's 2002 book, Honeypots: Tracking Hackers. Some of the findings: The incidence of attack has doubled in the past year; attackers are increasingly using automated point-and-shoot tools with pluggable exploits (making tools easy to update as new vulnerabilities are discovered); and, despite their bravado, few hackers use novel attacks.

Honeypots are primarily a research tool, but they have genuine business applications as well. Put a honeypot on an IP address adjacent to your company's Web or mail server, and you'll get an idea of the attacks to which it is subject. But don't give the adjacent machine a name with your domain name server—after all, most attacks are done by IP address. You'll get even better intelligence if the honeypot uses the same operating system, patch level and application suite as the machine you're trying to protect. In fact, make it an exact copy and then monitor all the traffic in and out of this honeypot machine. If it gets compromised, you'll know what to look for on your production machine.


With a honeypot, you constantly match your wits against the bad guys'. You get to choose the battlefield, but your opponent gets to choose the time of the battle.
To be sure, honeypots and honeynets are not "fire and forget" security appliances, a point that Spitzer repeatedly stresses. According to the Honeynet Project, it typically takes between 30 hours and 40 hours of analysis to really understand the damage that an attacker can do in just 30 minutes. The systems also require diligent maintenance and testing. With a honeypot, you constantly match your wits against the bad guys'. You get to choose the battlefield, but your opponent gets to choose the time of the battle. As a result, you must stay alert.

One of the most exciting things happening in the world of honeypots is the development of virtual honeynets—whole networks of virtual computers running on a single machine using a "virtualized computer" system like VMware or User-Mode Linux. A virtualized system lets you run a few (typically four to 10) virtual computers on a single host system. Virtual honeynets dramatically cut costs, machine room space and honeypot management complexities. And since the virtual computer's "disks" are actually files on the host system, it's easy to detect any changes the attacker may have performed and, when necessary, wipe them out. What's more, virtual systems typically support "suspend" and "resume" functionalities, allowing you to freeze a compromised computer, examine the attacker's processes, and open TCP/IP connections and anything else that's on the system.

For the CSO of a large organization, one of the best reasons to run a honeynet is to detect hostile insiders. Any company with more than a few hundred employees is bound to have one or two bad apples behind your firewall and probing for internal weaknesses. What better way to find them than with inside honeynets? Cut off from the outside world and set next to systems used by accounting and payroll, they'll tell you if someone is exploring where he shouldn't. A well-monitored system might even point you back to the perpetrator.

Ironically, monitoring your honeypot has its own legal complications—for instance, potential violations of wiretapping laws. Although there is currently no case law, most people familiar with this area of the law believe that consent banners are the way to go. That is, give every honeypot a banner that says "Anyone using this system consents to having their activity monitored and disclosed to others, including law enforcement."

Then, to keep your honeypots from sticking out like a sore thumb, every other computer in your organization should have a similar banner. But you've done that already, right?end


Simson Garfinkel, CISSP, is a technology writer based in the Boston area. He is also CTO of Sandstorm Enterprises, an information warfare software company. He can be reached at machineshop@cxo.com.





Add a Comment: Your comment will be displayed at the bottom of this page, at the discretion of CSOonline.

Name:
Title:
Corp:
Email:
Subject *
Your Comment: *

* Required fields.
We do not post comments promoting products or services.
Comments are owned by whomever posted them. CSO is not responsible for what they say.
Selected comments may be published in CSO magazine.
We will neither sell nor display your personal information.







All content copyright CXO Media Inc., 1994-2002. All rights are reserved. No material may be reproduced electronically or in print without written permission from CXO Media, 492 Old Connecticut Path, Framingham, MA 01701.

Dated: May 2003


http://www.csoonline.com/read/050103/machine.html