11.3 - Honeypots

 11.3 - Honeypots 

 

Key Terms: 

    • Honeypot – A physical or virtual network device set up to look like a legitimate network resource to attract a hacker. 
    • Low-level – A honeypot that stimulates a limited number of services and applications of a target system. 
    • Honeypot interaction levels – Indicates the amount of interaction that a hacker can have with a honeypot. 
    • Medium-level – A honeypot that simulates a real OS, applications and services. 
    • High-level – A honeypot that simulates all services and applications. It can be completely compromised to give a hacker access to a controlled area. 
    • VMware – A virtualisation software. 
    • User-Mode Linux (UML) - A software program which allows a user to virtually run one or more versions of Linux on one session. 

 

Honeypots 

Honeypots are network devices set up to look like a real network resource. They are implemented to attract hackers and can monitor the hacker’s activity if they try to break into it. Honeypot environments are designed to safely store and monitor malicious files and code if the hacker chooses to upload rootkits and malware. 

 

Honeypot Types 

    • Physical – These are actual network devices with real IP addresses on the network. 
    • Virtual – These are simulated devices on a network. Virtual honeypots are usually more cost-effective. 

 

Honeypot Placement 

Based on the topology of the network, honey pots can be placed inside or outside the firewall. If placed on the outside of the firewall, there is less risk of accidental breaches into the network. However, if placed inside the firewall, the honeypot will look more realistic and valuable. 

 

Honeypot Interaction Levels 

A low-level honeypot simulates a small number of applications and services on a network. They can’t be compromised fully, and they are generally set to collect information about attacks. Medium-level honeypots simulates a real OS, application and services. High-level honeypots simulate all services and applications that can be found on a real device. High-level honeypots look the most realistic however, they have the most risk and highest cost. 

 

Tools 

    • KFSensorAn IDS and honeypot simulator. 
    • HoneyBOTCapable of simulating a wide range of services and applications. 
    • HoneyDriveA Linux based honeypot that contains preinstalled and configured services/applications. 

 

Find Honeypots 

To find a honeypot, a hacker may probe the services running to find suspicious activity that may indicate a honeypot. Ports that show running services but deny handshake connections may also indicate a honeypot environment. 

Comments

Popular posts from this blog

OSA Assignment 1 - Task 3 GUIDE

OSA Assignment 1 - Task 1 GUIDE

OSA Summer 2023 Mock - Task 1, Assignment 1