Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×

Fun Things To Do With Your Honeypot System 136

An anonymous reader writes "Whitedust is running an interesting article on honeypots and their uses. From the article: 'Most papers deal with the potential gains a honeypot can give you, and the proper way to monitor a honeypot. Not very many of them deal with the honeypots themselves... Honeypots can be used to ensnare and beguile potential hackers; entice them to give you more research information, and actively defend your production network."" From the article: "Once an attacker has taken all the trouble to set up shop on your honeypot, he'll probably want to see what else there is to play with. If your honeypot is like most traditional honeypots, there's not much for an attacker to do once he gets in. What you really want if for the attacker to transfer down all the other toys in his arsenal so you can have a copy as well. Giving an attacker additional targets with various operating systems and services can help him decide to give you his toys. The targets can be real, but you'll get almost as much mileage if they're simulated. A good place to start is to put a phantom private network up hung off the back of the honeypot."
This discussion has been archived. No new comments can be posted.

Fun Things To Do With Your Honeypot System

Comments Filter:
  • by aaronhaley ( 145305 ) <aaronhaley.gmail@com> on Sunday July 30, 2006 @02:31PM (#15812326) Homepage
    In addition to all of the things on the network I normally have to do at the office let me set up an entire phantom network just to "jack" with hackers. Yeah, I'll get right on that.
  • by aaronhaley ( 145305 ) <aaronhaley.gmail@com> on Sunday July 30, 2006 @02:39PM (#15812375) Homepage
    No I get the point. I was making a joke, but I still thing it's silly. Why don't you just secure your network and you don't have to worry about it. Unless I worked for a security company or network vendor I wouldn't waste my time trying to score a hacker's toolkit. Unless I'm running something that's home made I don't really need to honeypot it. The # of "real" hackers out there compared to script kiddies is very small. I can download the script kiddie tools myself if I want. Nice AC post by the way.
  • Risk to others (Score:5, Insightful)

    by Anonymous Coward on Sunday July 30, 2006 @03:30PM (#15812649)
    What if someone uses the trojans, etc. they install on your honeypot to launch an attack on some other site? Since your express purpose is to watch what they do, you can't claim ignorance.

    Are you liable for any damages?
    Are you causing problems for law enforcement or other sysadmins by helping the attacker obscure their identity?

    Seems like you would need to filter outbound traffic VERY carefully. It would be almost impossible to do this without the attacker knowing -- they'd realize it was a honeypot and get the hell out of there.
  • Re:Idiot (Score:2, Insightful)

    by udderly ( 890305 ) on Sunday July 30, 2006 @04:04PM (#15812826)
    Dude (or Dudette), are you new here? Didn't you realize that correcting other people and then feeling superior is what /. is all about. Heck, it's one big "I'm smarter than you" pissing contest.
  • by Clovert Agent ( 87154 ) on Sunday July 30, 2006 @04:05PM (#15812830)
    A place, I once worked at, had a dozen or so entirely unpatched Win98 boxes connected directly to the net - for years.

    I seriously doubt it - not if you mean "in the last several years". Any unprotected box hanging directly off the net will be scanned and fingerprinted within minutes if not seconds of connecting, and exploited automatically. Botnets aren't kiddies' toys anymore: they're very professionally run and your unpatched '98 box is just grist for the mill.

    About five years ago I timed scans off a dialup connection in, let's say, a hostile part of the world - average of around 20 seconds from connect to scan. It hasn't gotten any better since.

  • Just one problem - (Score:4, Insightful)

    by njdj ( 458173 ) on Sunday July 30, 2006 @04:16PM (#15812877)

    a fake database or two, some Word documents showing that the US has a secert base in the middle of the everglades....

    You'll then get pulled in by Homeland Security and shipped to Gitmo for revealing that the US has a secret base in the middle of the Everglades.

  • by Joe U ( 443617 ) on Sunday July 30, 2006 @04:19PM (#15812894) Homepage Journal
    And if he corrects it to read:

    "Thou shall not use any programming language that works on only one OS. "

    Then it's a typographical error, most likely a soft-broken 'Y' key, and the joke falls apart. Making fun of someone with a broken keyboard is just mean. He might be on his way to CompUSA right now for all you know.

    Now, if he corrects it to read:

    "Thou shall not use a programming language that works on only one OS. "

    Then it's grammatical, and the joke will hold up. The world will be safe from poor grammar. You will have fulfilled your destiny. Crush the lesser races, conquer the galaxy, unimaginable power, unlimited rice pudding...Etcetera, etcetera...

    (or not)
  • by x2A ( 858210 ) on Sunday July 30, 2006 @04:43PM (#15813012)
    No, the emulation's fine, vmware was never designed to be undetectable, instead it was designed to provide a stable host-machine-hardware-independant machine... ie, if I installed Windows (known for not coping with motherboard/chipset changes well at all) in vmware on one machine, and move the virtual machine to another completely different set up machine, it will still run with no problems and no driver changes required. This is one of the things that makes vmware such a great tool.

    This means that you can detect that specific hardware configuration and tell that it's vmware.

  • Bad advice (Score:3, Insightful)

    by frovingslosh ( 582462 ) on Sunday July 30, 2006 @05:24PM (#15813204)
    from the aericle:

    Simulated traffic can be used in conjunction with simulated targets....If you want to really see what the attacker is all about, simulate traffic that looks like someone trading MP3s, or traffic that looks like someone transferring business documents. If the attacker spends most of his time looking at the MP3 traffic, he is probably pretty harmless. If he spends his time looking at the documents, he is probably pretty dangerous.

    Yea, right. Great advice, right up to the day that the RIAA and their FBI thugs come breaking down your door and taking every computer that you own and anything else they want too, because the hacker that broke into your system and saw all that traffice was an RIAA hacker.

  • "From The Article" (Score:3, Insightful)

    by jonabbey ( 2498 ) * <jonabbey@ganymeta.org> on Sunday July 30, 2006 @05:50PM (#15813314) Homepage
    Zonk, is it necessary to edit down what your submitters give you and take half of the post to include part of the referenced article?
  • by JustJake ( 130239 ) on Sunday July 30, 2006 @08:59PM (#15814168)
    until someone uses your honeypot as a platform to attack someone else. Or were you thinking that bad guys never use machines under their control in this manner?

    Who are these security people with so much free time that they can monitor a honeynet for hours on end and create bogus traffic to move across it in order to entertain a bored 16-year-old hacker from who knows where? Every serious professional I know is up to his eyeballs in real work.
  • by mcrbids ( 148650 ) on Monday July 31, 2006 @01:03AM (#15815111) Journal
    Why don't you just secure your network and you don't have to worry about it.

    In my life, I've identified a few key words that are highly accurate in ferreting out people who waste time. One of these is "paradigm". Those who wax poetic about "paradigm" are typically those who haven't bothered to figure out how things work, and are trying to convince you to do whatever it is that they think might work.

    Big waste - RUN!

    I've come to discover that "just" is a key word. It positively identifies those who have no idea what they're talking about. The most rediculous, inane, and useless activities I've ever seen all started with the word "just" in the job description. Like:

    "Solar power is feasible - just bring down the cost of manufacturing"...

    or,

    "Sex is no big deal - just get a girlfriend"... (big one for many who peruse these boards)

    or,

    "The software works great - we just need to change a few basic assumptions..."

    So, watch that word, "just". It usually fortells major catastrophe and certainly unrealistic expectations!
  • by Dion ( 10186 ) on Monday July 31, 2006 @08:38AM (#15816384) Homepage
    At least I can say one good thing about G.W. Bush... you know where he stands on things, because he doesn't change his answers, speaches, or actions...

    Dude, there are two things wrong with this:

    • It's perfectly fine to change your mind when new data comes to light, holding on to a belief against evidence is stupidity.
    • Bush does change his standpoint from time to time, just look at the whole "Let's ignore Bin laden" to "war on terr".

    Really, Bush and his handlers have run your country into the ground, demonstrated their complete lack of respect for human and civil rights as well as your own constitution and yet there are sheep like you who just bend over while praising the Great Leader.

    I mean, doesn't a graph like this one [cedarcomm.com] tell you that Reagan, Bush I and Bush II are not conservatives, but rather creditcard maxing out white trash?

    Doesn't conservatism mean spending less money?

Top Ten Things Overheard At The ANSI C Draft Committee Meetings: (5) All right, who's the wiseguy who stuck this trigraph stuff in here?

Working...