Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-22-2003 12:24 AM
тАО08-22-2003 12:24 AM
Reading this thread (http://forums.itrc.hp.com/cm/QuestionAnswer/1,,0x049179bb349d2249bcb59fddb8df1d49,00.html)
I found something that attracted my curiosity.
The argument about these 'honeypots' is new for me and I think it is really interesting.
I'm not going to add a honeypot to my network (I'm just a DBA :-), so I would like to hear your experiences/opinions about these 'traps'.
What do you know about? What is needed to set up a honeypots? What does the intruders do to avoid the trap? When a honeypot is needed? These are some questions that came in my mind.
Thanks to all!
P.S.: I have got some magic rabbits on my desk...
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-22-2003 01:37 AM
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-22-2003 03:30 AM
тАО08-22-2003 03:30 AM
SolutionI could xrite pages on that subject... To be short, a honeypot is useful if you want to trap crackers and look at what they try. For example, I teach in several university and colleges, and we've set up 'central servers'... that are honeypots to track what our student try to get the servers down... (the real servers are behind). It can be the same if you ahve a web server being often hacked...
You don't need much material, an OS on a separate machine, or even on the same machine as something else, through vmware for example.
To learn about that, the best place to start is noneynet, you can even browse through 'scans of the month' which are monthly traps of one of the honeypot network...
http://www.honeynet.org/
J
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-22-2003 05:40 AM
тАО08-22-2003 05:40 AM
Re: honeypot
The first thing you do is install tools like Bastille, and take steps to put ftp in a chroot jail if you can't get rid of it totally. You also want to run DNS as a non-root user, which Bastille will help you do.
A good iptables setup is a must to limit the number of holes you have.
Then you can set up the old honeypot and see if anyone gets through the castle walls. Its just technology, but the nice part is it seems to cut down on how many logs you need to go through.
If its not obvious, I have never used one, but I'm an experienced and intrigued admin and am adding my thoughts.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-22-2003 11:35 PM
тАО08-22-2003 11:35 PM
Re: honeypot
What is very fun is to set up a firewall on your honeypot, not a too strong one, but enough to have your script kiddies work a bit on it...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-23-2003 02:36 AM
тАО08-23-2003 02:36 AM
Re: honeypot
Fisrt perhaps by setting up these's traps "honeypot" you also create "offender's that would otherwise not have commited offense, you could argue that the potential offender prexisted ... ok this is contrevertial, dont want to create a punic war
second and more importantly in my vue you will perhaps get the attention of a real dangerous offender that would have otherwise passed by and would not have taken an other look because not worth a second look ! "for the offender to difficult and good first line defence to big time investment for small reward"
so in brief if your a big target " a big reward to offender's " like a well know compagnie that will get hit anyhow then you will get the attention no matter what so capture then with sweet honey could work for you !
Else you could just attract all sort of trouble that would have passed by !
I most case Best defence ! is
Bastille,firewall,tripewire and good dose of humility + intelligent gatekeeper ( I mean good system(s) administrator(s) to trim,read and understand the log's, to implement some diagonal and unpredictable checks )
just my 2c worth opinion.
Jean-Pierre.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО08-23-2003 05:44 AM
тАО08-23-2003 05:44 AM
Re: honeypot
In my view ,Honeypots are very useful for security analyst or a forensic analyst than for a security administrator.
Implementing honeypot needs good understanding of the behaviour of the honeynet modules and hardening of the underlying OS. Also the approval of management is very essential bcoz of the legal issues due to possible breach of privacy.
There are many open source honeypots and commercial honeypots available in the market.
honeyd is a good open source honeypot which runs on linux.
We can check lot of things to identify a honeypot.
Passive fingerprinting is one of them , they examine and compare ISN ( initial sequence number ), TTL of the packets , windows size etc to identify the base OS and hence will deduce the network services as deceptive.
Then we can compromise the base OS with some exploit. Then honeypot itself will be a zombie host for hacker to attack other networks. Most honeypots can detect and log the attacks towards them and can't log attacks on other real hosts.
Proxy arp based honeypots are normally used to deception for a pool of IP addresses.
If you intend to run a honeypot , run a approved production honeypot outside your firewall and regular monitoring is vey necessary. Honeypots helps us to analyse the novel attack methods in real-time and to provide fair amount of forensic data.
regards,
U.SivaKumar.