Research Project 2: Metasploit-able Honeypots



Similar documents
The Second International Conference on Innovations in Information Technology (IIT 05)

Securing the system using honeypot in cloud computing environment

Bridging the gap between COTS tool alerting and raw data analysis

Advanced Honeypot System for Analysing Network Security

Penetration Testing with Kali Linux

CS 558 Internet Systems and Technologies

NEXPOSE ENTERPRISE METASPLOIT PRO. Effective Vulnerability Management and validation. March 2015

Vulnerability Assessment and Penetration Testing

Towards automated exploit signature generation using honeypots

Honeypots & Honeynets Overview. Adli Wahid Security Specialist, APNIC.net adli@apnic.net

Keywords Intrusion detection system, honeypots, attacker, security. 7 P a g e

HONEYPOT SECURITY. February The Government of the Hong Kong Special Administrative Region

Lab 7 - Exploitation 1. NCS 430 Penetration Testing Lab 7 Sunday, March 29, 2015 John Salamy

Project Proposal Active Honeypot Systems By William Kilgore University of Advancing Technology. Project Proposal 1

On-Premises DDoS Mitigation for the Enterprise

NCS 430 Penetration Testing Lab #2 Tuesday, February 10, 2015 John Salamy

CIT 480: Securing Computer Systems. Vulnerability Scanning and Exploitation Frameworks

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

DYNAMIC DNS: DATA EXFILTRATION

HONEYPOTS REVEALED Prepared by:

USE HONEYPOTS TO KNOW YOUR ENEMIES

Chapter 9 Firewalls and Intrusion Prevention Systems

PROFESSIONAL SECURITY SYSTEMS

PowerShell. It s time to own. David Kennedy (ReL1K) Josh Kelley (Winfang) Twitter: dave_rel1k

Secure Web Application Coding Team Introductory Meeting December 1, :00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda

A Survey on Honeypot Based Signature Generation Techniques in Computer Network Security

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

WHITEPAPER. Nessus Exploit Integration

What Do You Mean My Cloud Data Isn t Secure?

How DataSunrise Helps to Comply with SOX, PCI DSS and HIPAA Requirements

SCADA Security Example

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Web Application Security Payloads. Andrés Riancho Director of Web Security OWASP AppSec USA Minneapolis

Vulnerability Scanning & Management

Using SNMP to Obtain Port Counter Statistics During Live Migration of a Virtual Machine. Ronny L. Bull Project Writeup For: CS644 Clarkson University

Reporting and Incident Management for Firewalls

Integrated Network Vulnerability Scanning & Penetration Testing SAINTcorporation.com

3. Firewall Evaluation Criteria

Exploiting Transparent User Identification Systems

How To Use Powerhell For Security Research

Introducing IBM s Advanced Threat Protection Platform

Automating SQL Injection Exploits

IntruPro TM IPS. Inline Intrusion Prevention. White Paper

The Weakest Link: Mitigating Web Application Vulnerabilities. webscurity White Paper. webscurity Inc. Minneapolis, Minnesota USA

Automating Security Testing. Mark Fallon Senior Release Manager Oracle

Agenda , Palo Alto Networks. Confidential and Proprietary.

INTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:

How To Perform An External Security Vulnerability Assessment Of An External Computer System

Deep Security Vulnerability Protection Summary

SQL Injection Protection by Variable Normalization of SQL Statement

Banking Security using Honeypot

API Cybersecurity Conference Industrial Control Systems Workshop. Sponsored by Alpine Security

Penetration Testing Workshop

Coimbatore-47, India. Keywords: intrusion detection,honeypots,networksecurity,monitoring

Attack Frameworks and Tools

Automated Penetration Testing with the Metasploit Framework. NEO Information Security Forum March 19, 2008

Contemporary Web Application Attacks. Ivan Pang Senior Consultant Edvance Limited

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

Configuring MassTransit Server to listen on ports less than 1024 using WaterRoof on Macintosh Workstations

Guideline on Firewall

Honeypot as the Intruder Detection System

Guidelines for Web applications protection with dedicated Web Application Firewall

Zero-Day Attack Signatures Detection Using Honeypot

Penetration Testing Report Client: Business Solutions June 15 th 2015

Certified Cyber Security Expert V Web Application Development

BLIND SQL INJECTION (UBC)

Dynamic Honeypot Construction

DEFENSE THROUGHOUT THE VULNERABILITY LIFE CYCLE WITH ALERT LOGIC THREAT AND LOG MANAGER

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

PKF Avant Edge. Penetration Testing. Stevie Heong CISSP, CISA, CISM, CGEIT, CCNP

Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.

On the use of Honeypots for Detecting Cyber Attacks on Industrial Control Networks

Modern Binary Exploitation Course Syllabus

Information Security Services

Metasploit ing the target machine is a fascinating subject to all security professionals. The rich list of exploit codes and other handy modules of

Black Box Penetration Testing For GPEN.KM V1.0 Month dd "#$!%&'(#)*)&'+!,!-./0!.-12!1.03!0045!.567!5895!.467!:;83!-/;0!383;!

Security Advisory. Some IPS systems can be easily fingerprinted using simple techniques.

IndusGuard Web Application Firewall Test Drive User Registration

1 Scope of Assessment

How to build and use a Honeypot. Ralph Edward Sutton, Jr. DTEC 6873 Section 01

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

Systematically Enhancing Black-Box Web Vulnerability Scanners

HONEYD (OPEN SOURCE HONEYPOT SOFTWARE)

AUTHOR CONTACT DETAILS

Security Issues with Integrated Smart Buildings

Black Hat Briefings USA 2004 Cameron Hotchkies

CHAPTER 3 : INCIDENT RESPONSE FIVE KEY RECOMMENDATIONS GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

Transcription:

Project 2: wouter.katz@os3.nl University of Amsterdam July 4th 2013

How feasible is an automated method to detect specific exploits on a honeypot by monitoring network traffic of exploits? What setup is needed in order to have exploits successfully complete their exploit against a honeypot? What is the best method to process network traffic to/from the honeypot to extract and match a unique signature from exploit traffic? How successful are these methods?

summarized Protocol independent

Why is this needed? A lot of the honeypot software contain outdated vulnerabilities Analysis of what happened requires manual analysis Having signatures for the most-used penetration testing tool allows for valuable insight in attackers activities What we want is to automatically detect modern exploits and show which exploits were detected.

Exploits used within Metasploit Within Metasploit, exploits targeting FTP server software were chosen as a test set for the research: Large number of exploits (37) FTP is plain-text protocol, makes development easier Simple commands/responses

Testing environment

Process

Python honeypot script Small database with 30 vulnerable FTP banners for all 37 exploits Implemented responses to most used FTP commands Saves all traffic Detect suspicious traffic

Detect suspicious traffic

Extract signatures from suspicious traffic Collect multiple suspicious flows for the same exploit, different payload Find the longest string shared by all suspicious flows using the Longest Common Substring (LCS) algorithm The resulting string will be used as signature This method depends on static parts in the exploit, regardless of the payload

Extract signatures from suspicious traffic Flow 1: ffeeddccacbefafabcdefbafcbaedfeaf Flow 2: aabcbeafffeeddccafbdeaabcdefbcffea Flow 3: feabcdefbfeacceafeabceffaecbeafabcaedd The string ffeeddcc is the longest common substring in the first 2 flows, but it does not occur in the 3rd flow.

Extract signatures from suspicious traffic Flow 1: ffeeddccacbefafabcdefbafcbaedfeaf Flow 2: aabcbeafffeeddccafbdeaabcdeffcffea Flow 3: feabcdefafeacceafeabceffaecbeafabcaedd The string abcdef is the longest common substring occurring in all flows. This will be the signature.

Extract signatures from suspicious traffic LCS found good signatures for 20 exploits from their suspicious traffic flows. The rest either had no signature, or a too generic signature (e.g. USER ). Solution: for the remaining exploits, run LCS on all other flows. Resulted in 12 good signatures for the remaining 17 exploits.

Matching signatures against traffic With the signatures, we should be able to detect exploits: Check each incoming flow in the honeypot for known signatures If a signature is found, print out the matching exploit

Matching signatures against traffic Problem: some exploits share the same signature, causing false positives. Easy solution: only check for signatures of exploits belonging to the current FTP banner.

In total found signatures for 32 out of 37 exploits (86%). Test how good these signatures detect exploits by firing all exploits against the FTP honeypot script, with every possible payload.

Average detection rate of 89.95%

Answering the research How feasible is an automated method to detect specific exploits on a honeypot by monitoring network traffic of exploits? What setup is needed in order to have exploits successfully complete their exploit against a honeypot? What is the best method to process network traffic to/from the honeypot to extract and match a unique signature from exploit traffic? How successful are these methods?

Answering the research What setup is needed in order to have exploits successfully complete their exploit against a honeypot? Many of the exploits check FTP banner and correct FTP responses. In order to allow exploits to complete successfully, we need to emulate both the banner and the correct responses.

Answering the research What is the best method to process network traffic to/from the honeypot to extract and match a unique signature from exploit traffic? In this research, a granular method of storing and processing network traffic was used. Extract signatures using the LCS algorithm, match traffic against signatures on-the-fly proved very effective.

Answering the research How successful are these methods? Not all exploits yielded a signature, but for the exploits that did, most signatures have a high detection rate.

Answering the research How feasible is an automated method to detect specific exploits on a honeypot by monitoring network traffic of exploits? The methods presented work very well. Easily portable to other protocols/exploits. Can work standalone or as part of existing honeypot software.

Questions Questions?

Anley, Chris, Heasman, John, Lindner, Felix, & Richarte, Gerardo. 2011. The shellcoder s handbook: discovering and exploiting security holes. Wiley. Baumann, Reto, & Plattner, Christian. 2002. White Paper:.