0% found this document useful (0 votes)
455 views20 pages

Honey Pot Slides

The document discusses the development of a web-based honeypot system to capture information about attackers. It describes four main concepts for deploying honeypots: data control, data capture, data analysis, and data collection. Two approaches are presented for designing honeypots: converting an existing web app or adding functionality to an existing low-interaction honeypot. Logging code is inserted to capture server variables like IP addresses and store them in an SQL database. An analysis tool called HIHAT provides an overview and detailed views of captured attacks to help identify patterns. Proper configuration includes securing the operating system, limiting connections and bandwidth, and using a honeywall.

Uploaded by

PriyankShah123
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
455 views20 pages

Honey Pot Slides

The document discusses the development of a web-based honeypot system to capture information about attackers. It describes four main concepts for deploying honeypots: data control, data capture, data analysis, and data collection. Two approaches are presented for designing honeypots: converting an existing web app or adding functionality to an existing low-interaction honeypot. Logging code is inserted to capture server variables like IP addresses and store them in an SQL database. An analysis tool called HIHAT provides an overview and detailed views of captured attacks to help identify patterns. Proper configuration includes securing the operating system, limiting connections and bandwidth, and using a honeywall.

Uploaded by

PriyankShah123
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 20

WEB BASED

HONEYPOT DECOYS
INTRODUCTION
HONEYPOT - a computer system on the Internet that
is expressly set up to attract and "trap" people who attempt
to penetrate other people's computer systems.
HONEYNET - a network containing honeypots
LOW INTERACTION - the functionality or
vulnerability it provides is only emulated
HIGH INTERACTION - provides real functionality
to the outside world and does not only perform emulation
4 MAIN CONCEPTS –
DEPLOYING HONEYPOT
DATA CONTROL - mitigate the risk
DATA CAPTURE - gather information about the
attacker, without the attacker’s knowledge
DATA ANALYSIS - converts the collected data
into sensible information
DATA COLLECTION - Transfer and store all
data captured in a central location
DEVELOPMENT OF
HONEYNET CREATOR
REQUIREMENT
system functionality and performance should be the same
as the identical web application would offer as a non-
honeypot system

Comprehensive data capture – stored externally on a


separate and secure system

Prevent attacker from using the honeypot

provide different means to support the process of


analyzing the collected data.

should be extensible that it easily adapt to new attack


patterns and exploits
DESIGN APPROACH
Design approach – 2 ways

to start off with an existing web application and


convert it into a honeypot

to take an existing low-interaction honeypot for a


specific web application and add any kind of
functionality separately
WORKING
In order to log the information an attacker enters into a
web application, the contents of four crucial arrays are
stored which are provided PHP

1. $_SERVER

2. $_GET

3. $_POST

4. $_COOKIE
WORKING (Cont…)
$_SERVER

HTTP USER AGENT - a string denoting the user agent


which was used to access the page

HTTP REFERER - describes the address of the page

REMOTE ADDR - the IP address of the current user


requesting a page
WORKING (Cont..)
REMOTE PORT - the port being used on the user’s
machine to communicate with the web server

HTTP ACCEPT - refers to the HTTP accept request-header

HTTP ACCEPT LANGUAGE - similar to Accept,


restricts the set of natural languages as a response
to the request

REQUEST TIME - keep track of every single


request
WORKING (Cont..)
$_GET - contains all data that is transferred to the
server via HTTP GET request

$_POST -contains all data that is transferred to the


server via HTTP POST request

$_COOKIE - contains all data that is transferred to


the server via HTTP cookies
LOGGING CODE
a specially crafted logging code is inserted into each relevant file of
the web application – following steps are performed

makes a list of each source code file the web application


comprises
serializes the data and stores it in an external SQL database.

recursively crawls the directory of the web application and creates a


list of all PHP and HTML files
the Honeypot-Creator performs all insertions at the beginning
ANALYSIS TOOL
To support the process of extracting the important information out
of the data

supports the analysis of data acquired from all different kinds


of web-based honeypots

Two main views - Overview mode and Detailed viewing mode

Tool - filters for attacks patterns


- Provides high expendability
- Should comprise an automatic download function
ANALYSIS TOOL
HIHAT - High Interaction Honeypot Analysis Tool

overview about the most recent entries.

Actual number of entries per access varies and


depends on the implementation of the web application

to avoid illicit access to the analysis tool, a password is


requested for the usage of HIHAT
STRUCTURAL OVERVIEW
Honey Log
pot I server

Honeypot II

SQL db
Analysi
s Tool
Honeypot
SQL db
III

Honeypot
IV
SQL
db
Honeypot
V
DATA CONTROL
to ensure the system is running within safe boundaries and
does not cause harm to other non-honeypot systems
Following issues has to be considered
Secure base operating system
Connection number limitation
Bandwidth limitation
Honeywall
TRANSPARENT LINKING

LEVEL1.php

LEVEL2.php\

LEVEL3.php
LEVEL1.php
LEVEL4.php
LEVEL2.php

LEVEL3.php
start LEVEL2.php
Index.php LEVEL4.php

LEVEL2.php
HONEYNET SETUP
A proper configuration and setup of the system can be
accomplished performing these steps

Operating system
High customizability
Good security support
Minimalistic system
Detailed documentation

Virtual machine setup


HONEYNET SETUP (Cont..)
Honey wall setup
Decoy selection
Log server setup
Honeypot - Creator
Transparent links
Setup of HIHAT
CONCLUSION

You might also like