SANS Dshield Webhoneypot Project. OWASP November 13th, 2009. The OWASP Foundation http://www.owasp.org. Jason Lam

Similar documents
3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Acunetix Web Vulnerability Scanner. Getting Started. By Acunetix Ltd.

Web Application Vulnerability Testing with Nessus

Acunetix Website Audit. 5 November, Developer Report. Generated by Acunetix WVS Reporter (v8.0 Build )

Exploiting Fundamental Weaknesses in Command and Control (C&C) Panels

JOOMLA SECURITY. ireland website design. by Oliver Hummel. ADDRESS Unit 12D, Six Cross Roads Business Park, Waterford City

Performing a Web Application Security Assessment

Online Vulnerability Scanner Quick Start Guide

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

Mingyu Web Application Firewall (DAS- WAF) All transparent deployment for Web application gateway

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

STOPPING LAYER 7 ATTACKS with F5 ASM. Sven Müller Security Solution Architect

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

What is Web Security? Motivation

Out of the Fire - Adding Layers of Protection When Deploying Oracle EBS to the Internet

Wordpress Security. A guide on how to not get hacked when using wordpress. David Kennedy (ReL1K) Twitter: Dave_ReL1K

Lesson 7 - Website Administration

Intrusion Detection Systems (IDS)

REDCap General Security Overview

From Rivals to BFF: WAF & VA Unite OWASP The OWASP Foundation

AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide

CS 558 Internet Systems and Technologies

Using Nessus In Web Application Vulnerability Assessments

WHITEPAPER. Nessus Exploit Integration

Cyber - Security and Investigations. Ingrid Beierly August 18, 2008

Exploiting Local File Inclusion in A Co-Hosting Environment

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

RTI v3.3 Lightweight Deep Diagnostics for LoadRunner

April 11, (Revision 2)

Adobe ColdFusion. Secure Profile Web Application Penetration Test. July 31, Neohapsis 217 North Jefferson Street, Suite 200 Chicago, IL 60661

SANDCAT THE WEB APPLICATION SECURITY ASSESSMENT SUITE WHAT IS SANDCAT? MAIN COMPONENTS. Web Application Security

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

WordPress Security Scan Configuration

Check list for web developers

THE OPEN UNIVERSITY OF TANZANIA

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

INTRUSION DECEPTION CZYLI BAW SIĘ W CIUCIUBABKĘ Z NAMI

Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security

Online Vulnerability Scanner User Manual

Windows Client/Server Local Area Network (LAN) System Security Lab 2 Time allocation 3 hours

InfoSphere Guardium Tech Talk Data privacy and dynamic masking for web applications: InfoSphere Guardium for Applications

Hardened Plone. Making Your Plone Site Even More Secure. Presented by: Nathan Van Gheem

Web Security Threat Report: January April Ryan C. Barnett WASC Member Project Lead: Distributed Open Proxy Honeypots

APPLICATION PROGRAMMING INTERFACE

Client logo placeholder XXX REPORT. Page 1 of 37

Getting Started With Halo for Windows

1. Introduction. 2. Web Application. 3. Components. 4. Common Vulnerabilities. 5. Improving security in Web applications

Managing Qualys Scanners

SaaS-Based Employee Benefits Enrollment System

IBM. Vulnerability scanning and best practices

REDCap Technical Overview

Information Technology Policy

HP WebInspect Tutorial

MageFence. User manual

Guidelines for Web applications protection with dedicated Web Application Firewall

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Application Security

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

CCM 4350 Week 11. Security Architecture and Engineering. Guest Lecturer: Mr Louis Slabbert School of Science and Technology.

JMS MULTISITE for joomla!

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

Advanced Web Security, Lab

Passive Logging. Intrusion Detection System (IDS): Software that automates this process

IBM Connections Cloud Security

Ruby on Rails Secure Coding Recommendations

Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net adli@apnic.net

Railo Installation on CentOS Linux 6 Best Practices

How to Grow and Transform your Security Program into the Cloud

Cyber Security Challenge Australia 2014

Web Application Security 101

Workday Mobile Security FAQ

On and off premises technologies Which is best for you?

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

TRUSTWAVE SEG SPAMCENSOR EXPLAINED

The Cyber Threat Profiler

ASL IT Security Advanced Web Exploitation Kung Fu V2.0

SAST, DAST and Vulnerability Assessments, = 4

NSFOCUS Web Application Firewall White Paper

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

RIA SECURITY TECHNOLOGY

Repsheet. A Behavior Based Approach to Web Application Security. Aaron Bedra Application Security Lead Braintree Payments. tirsdag den 1.

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

Sitefinity Security and Best Practices

McAfee Certified Assessment Specialist Network

Developing ASP.NET MVC 4 Web Applications MOC 20486

Hardening Joomla 1. HARDENING PHP. 1.1 Installing Suhosin. 1.2 Disable Remote Includes. 1.3 Disable Unneeded Functions & Classes

STATE OF WASHINGTON DEPARTMENT OF SOCIAL AND HEALTH SERVICES P.O. Box 45810, Olympia, Washington October 21, 2013

Maltego Tungsten as a collaborative attack platform BlackHat 2013

Web Vulnerability Scanner v9 User Manual

(WAPT) Web Application Penetration Testing

Web Vulnerability Scanner by Using HTTP Method

International Journal of Enterprise Computing and Business Systems ISSN (Online) :

Cisco IPS Tuning Overview

SANS Top 20 Critical Controls for Effective Cyber Defense

Transcription:

SANS Dshield Webhoneypot Project Jason Lam November 13th, 2009 SANS Internet Storm Center jason@networksec.org The Foundation http://www.owasp.org

Introduction Who is Jason Lam Agenda Intro to honeypot design Look at some data we collected Future plans Solicit participation 2

Dshield History Started in November 2000 Collect perimeter logs (infrastructure) Provide attack trending information for community Notify community of upcoming attacks based on captured data 3

Dshield Screen Capture 4

Goal of Webhoneypot Collect quantitative data about the prevalence of large scale automated attacks Capture logs from distributed honeypots Easy to deploy (by volunteers) Resilient against attacks Low maintenance Gather High definition logs Sufficient submitter privacy 5

Current Statistics 20 25 active sensors run by volunteers Collecting data since Jan 2009 Averages about 18,000 requests/day 300-500 unique sources (IP) per day 6

Web Server Logs Not Enough? Web server logs does not contain the detail level Privacy issues with real logs HTTP Body HTTP Header Decision Go with a software client, written in PHP Collect entire request (header + body) Software client developed by a group of volunteers 7

High Low Interaction High Interaction Maintenance nightmare Get good insight into attack process Low Interaction Less work, looks fake to the attacker Less insight Decision Ended up with low interaction design Aim for fast scan detection, less for targeted attack 8

Serving Multiple Vulnerabilities Some mass exploit scripts look for specific page before sending attack Other script uses Google hacking to find target page Decision Uses multiple template based on the request (REGEX) Somewhat real looking page with graphics Indexable (more on that later) 9

Regex Example /PHPBB(.*)/i 101 /horde\-[\d\.]+\/(.*)/ 1600 /(login_page.php$)/ 1603 squirrelmail 1605 10

Log Collection Periodical Store for period of time, then forward More complicated Per request As the request comes in, send to central server Easy to implement Similar to most logging protocol Decision Push logs to centralized server at every request Ignore related requests 11

Update Mechanism Templates need to be updated Honeypots should be refreshed periodically Not all honeypots should look the same Decision Client updated daily Clients separated in groups, get different set of templates 12

Images Requests Templates have internal reference Generate extra noise Some images or CSS requests are legit Decision Filter out all internal referenced images and CSS files Might loss some details but overall cut down noise 13

Templates Serve multiple different version of pages according to the HTTP request Make the honeypot more "real" Uses regex /phpbb/ -> template 1 Use Google to link them together 14

Templates Linking (Search Engine) 15

Client Architecture - Request Processing requests ( index.php ) 1. Request received by index.php 2. Send complete request to collector 3. Compared to regular expressions in configuration file 4. Select template (or use default template) 5. Add random link to template (to refer to other honeypots) 6. Server template to scanner 16

Client Architecture - Update Update Process ( update.php ) 1. Script scheduled via cron 2. Checks for new templates / new honeypot 3. Uses nonce / hmac algorithm to validate update 4. Downgrades will not be accepted, only upgrades 17

Client/Server Client Collects Requests Forwards request to server ( POST ) Server queues requests in flat files Cron job parses request and inserts them into the database 18

Server Side MySQL Backend PHP Frontend No expensive log management tools Uses the same backend architecture as Dshield Requests are parsed before they enter the database Some reports are generated on hourly basis 19

Server Database Architecture Daily tables for Requests, Headers and Reports Request: Full requests Headers: Parsed headers ( name -> value ) Reports: Summary including submitter info Various summary tables which are updated whenever data is added to speed up web frontend. Tables use MyISAM type to increase insert speed. Tables are not updated so transactions would be overkill. (can afford to loose a report once in a while) Inserts are done in bulk on a schedule to avoid locking issue. ( DShield Architecture ) 20

Other similar projects WASC Honeypot Proxy based Glastopf Google Hack Honeypot (GHH) Honeyjax 21

Differences to Dshield Honeypot Dshield Honeypot is 100% open source Data available under creative commons share alike license Frontend updated real time Can use existing web servers and be placed in live networks 22

Outlet of Information Reports of information on the SANS Internet Storm Center website Limited public search capability (limited resources) Analysis done by public and ISC handlers Full information feed available upon request (researchers only) http://dshield.org/ research.html 23

Basic Reporting (Demo) URL accessed Top 10 sources Headers with drill down Daily volume Limited header search 24

Attack Classification (Demo) Classify attacks into categories RFI, SQL injection, XSS... Regex on the request 25

What does the data look like Top Attacks Remote File Include ~ 3000 Directory Traversal ~50 Proxy ~10 SQL Injection ~10 RFI is by far the most common attack 26

Future Directions Community Driven!!! RFI Contribute templates Validated before released Attack classification, regex contribution All these will be vetted by users (voting system) Actively analyze these RFI destination Correlate the attacks to gather more intelligence Collaborate with other groups 27

Want to Participate? Install Honeypot client Review our logs on ISC site daily Alert ISC if anything is worth noticing Contribute templates Contribute regex for classification of attacks 28

Download Me Today Download from ISC portal Sign in first and then look under My Information Requirement PHP (if you want work on a.net version. Its not much code!) Apache (Unix at this time) Internet accessible 29

Questions http://twitter.com/jasonlam_sec jason@networksec.org Thanks! 30