Re: Honeypot detection and countermeasures

From: Gerardo Richarte (gera@corest.com)
Date: Tue Jun 24 2003 - 17:00:33 EDT


Larry Colen wrote:

> I'm doing some research on honeypot detection, and preventing
> honeypots from being detected. I'd greatly appreciate some feedback
> from pen-testers on the following issues:

    I find this an interesting subject.

    IMHO, when somebody is paying you/me to do a pen-test he's not
only trying to find what hosts can be hacked into, but instead he's willing
to test the security of the complete organization, and here I'm being, I
think, a
little more open than most people. The whole system includes not only
servers and networks, but also (oh well... this is not new) people,
stablished
trust relationships, etc.

    If there is a honeypot in place, or NIDS or firewall or whatever
security
appliance or policy. I would expect my client to try to find how usefull
this
tools are for securing the organization. If I hack into a honeypot, I would
report it back, and I would expect somebody from the security team to
realize I'm hacking into the honeypot (or looking at NIDS or firewalls
alerts).
If nobody reacts to the alerts, well... although I hacked into a honeypot,
I could say I found a security flaw in the organization, because one of the
countermeassures was not effective.

    So, to wrap up this too-long mail, if there is a honeypot in the
net, I would
try to avoid hacking into it, and do everything a hacker would do to
detect it,
because I'm being paid to tell my client how vulnerable the organization
would
be to a real attack, and well... I tend to think attackers are as smart
as I can
be when emulating them as part of a pen-test.

    All this said, of course the client an choose to ask you not to
target honeypots,
or can just tell you what IPs are honeypots, but this would be changing
the attacker
profile, either to a "script kiddie", who will not be carefull with
honeypots, or to
an advanced attacker, who will not target honeypots at all... for
example...

    erm... yeah

    gera

---------------------------------------------------------------------------
Latest attack techniques.

You're a pen tester, but is google.com still your R&D team? Now you can get
trustworthy commercial-grade exploits and the latest techniques from a
world-class research group.

Visit us at: www.coresecurity.com/promos/sf_ept1
or call 617-399-6980
----------------------------------------------------------------------------



This archive was generated by hypermail 2.1.7 : Sat Apr 12 2008 - 10:53:35 EDT