Exploit HoneyPot: Explained

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
14317
Проверка EDB
  1. Пройдено
Автор
S1AYER
Тип уязвимости
PAPERS
Платформа
MULTIPLE
CVE
N/A
Дата публикации
2010-07-10
Код:
Topic: HoneyPot :Explained
Author:s1ayer

Greetz:b0nd bro, Eberly, r45,vaibhav,jappy,Mr.XXXX,Godwin Austin,sai bro, fb1, and all ICW and G4H members

Shoutz: To all Indians out there.

contact:[email protected]

Website:www.garage4hackers.com
        www.andhrahackers.com
        http://www.security-informatica.blogspot.com
=======================================================================================================================
What is HoneyPot??
In layman terms we can say it is a trap set by the administrators for the hackers, to fool them or to make them believe 
that they are hacking into admins system, but instead of that hackers are getting hacked by the admin.

How does this work??
This works by presenting the hackers a foul scenario where , hacker thinks that he is penetrating into the system but 
instead, he is going no where except he is playing in the world created by the admins. By doing so, admins are able to check all 
the malicious activity of the hackers like what all ports hackers are trying to connect, what files they are trying to upload, 
which all sections they are trying to access.

HonyPot is mainly designed to trap the hackers, or present a virtual system to the hackers which never exists.

Technically, Honeypot tries to listen to all the ports on the system, and whenever hacker tries to port scan the system, 
it gets a list of open ports which he thinks is open but actually, it is the opened port which is shown by the honeypot behind 
the firewall, so when ever hacker tries to access some random port say 100, then he is accessing the honeypot not the system.

Above scenario can be visualised better: Install a VM ware on a system and run any low version of windows or linux on it with
 all ports open, and port forward those ports on the host system, so when ever hacker tries to fingerprint or try to do port 
scan, then he will be gettng info about the VM ware not the host system, hacker may be able to penetrate into the VM ware OS,
 but our HOST OS remains safe.

But there are mainly deficulty in doing the above job , so special application is created called HONEYPOT to do this job and
 many other jobs like tracking of packets, file access etc.

There are mainly 3 types of honeypots available:
1.Small: Mainly keeps the log of ip-address which are trying to access your system alongwith the port
2.Medium: Its functionality is little advanced, keeping track of files accessed, time-period, hosts etc.
3.Large: It provides all the functionality, but the main feature of these kind of Honeypots are security feature, these can 
simulate virtual os for the outsiders or hackers very well.

In this article I am going to give the example of HoneyPot of small scale for Windows.
HoneyPots are available both on commercial platform and also as open source, I am taking the example of KFsensor which is
 freely available on their official website.
STEP 1: Download the KFSENSOR and winpcap from their website and install them
STEP 2: Restart your system, start winpcap server from the folder menu where it is saved mainly in c:\ drive
STEP 3: Start KFsensor, do as promted in the window , it is mainly for the configuring of your new HONEYPOT.
STEP4: Done, keep your system up for the packets scanning.


image:http://3.bp.blogspot.com/_bujltUQhRY0/TDZLzqusauI/AAAAAAAAADI/AuA8PkHu3R0/s640/untitled.bmp

Here in above picture u can see some port numbers are striked out, because you need to restart the system, then start your
 honeypot, then internet connection, else these ports will be used by net connection first, then this honeypot willnot be
 able to access these ports, hence no information gathering will be possible.

image:http://3.bp.blogspot.com/_bujltUQhRY0/TDZPfypnPaI/AAAAAAAAADQ/O68f_6mOYKU/s640/untitled.bmp
Within minutes of intallation of this small honeypot i got the scanning alert sound, when checked these were the UDP packets 
mainly left over the internet for scanning of hosts.
============================================================================================================================
Silence is not our weakness, Its just we dont want to waste our time, Its my way of explanation...............

JAI MATA DI
 
Источник
www.exploit-db.com