intelligent honeynet
play

INTELLIGENT HONEYNET ACTIONABLE INFORMATION FROM HONEYPOTS - PowerPoint PPT Presentation

INTELLIGENT HONEYNET ACTIONABLE INFORMATION FROM HONEYPOTS INTELLIGENT HONEYNET ACTIONABLE INFORMATION FROM HONEYPOTS JOSH PYORRE Security Researcher Threat Analyst at NASA Threat Analyst at Mandiant @joshpyorre HONEYPOTS CURRENTLY IN USE


  1. INTELLIGENT HONEYNET ACTIONABLE INFORMATION FROM HONEYPOTS

  2. INTELLIGENT HONEYNET ACTIONABLE INFORMATION FROM HONEYPOTS JOSH PYORRE Security Researcher Threat Analyst at NASA Threat Analyst at Mandiant @joshpyorre

  3. HONEYPOTS CURRENTLY IN USE SSH: COWRIE MALWARE: DIONAEA GAS TANKS: GASPOT SCADA: CONPOT

  4. SSH Cowrie (a fork of Kippo)

  5. SSH Cowrie (a fork of Kippo) Writes two log files

  6. SSH Cowrie (a fork of Kippo) Writes two log files cowrie.json cowrie.log

  7. SSH Cowrie (a fork of Kippo) Writes two log files Creates session files

  8. SSH Cowrie (a fork of Kippo) Writes two log files Creates session files tty/sessionreplayfiles

  9. SSH Cowrie (a fork of Kippo) Writes two log files Creates session files IPTABLES Rule sends port 22 to Cowrie Admin access changes to port 2223

  10. Video or Demo of replaying an ssh logfile

  11. DIONAEA Catches malware

  12. DIONAEA Catches malware Writes to sqlite db

  13. DIONAEA Catches malware Writes to sqlite db Saves malware in a folder called ‘bistreams’

  14. DIONAEA Video of what the database looks like

  15. CONPOT SCADA HoneyPot Imitates industrial control systems

  16. GASPOT Imitates sensors that control gas tanks

  17. OPEN PORTS ON THE HONEYPOTS

  18. OBSTACLES • Installation is a pain • They’re all different • Dionaea doesn’t like Ubuntu after 12.04

  19. CURRENT HONEYPOT NETWORKS What has inspired me…

  20. CURRENT HONEYPOT NETWORKS Modern Honey Network is a great implementation of a well-organized honeypot installation system

  21. CURRENT HONEYPOT NETWORKS It provides statistics and easy installation options for various honeypots

  22. THEY HAVE MAPS!

  23. THEY HAVE MAPS! MOSTLY USELESS Maps are cool if you’re a pilot

  24. BUT WE WANT MORE

  25. WE WANT TO BE LIKE THIS GUY To be like this guy I’m already this guy 
 Note: This is Josh, 
 the author of this 
 Brian Krebs presentation. • He gets close to the 
 attacker source. • He is often the source of 
 information for us.

  26. …OR LIKE THIS CHARACTER From the show, Mr Robot. Watch it!

  27. TO KNOW HOW THEY THINK…

  28. BUT WE HAVE SOME PROBLEMS

  29. WE WORK IN THE PAST

  30. WE GET REPORTS FROM THE GOVERNMENT And they are often late and full of mistakes

  31. WE GET REPORTS FROM COMPANIES This one was ok, but outdated when it was released

  32. WE GET REPORTS FROM COMPANIES Also fine, but outdated

  33. WE GET REPORTS FROM COMPANIES That is actually just marketing :(

  34. WE GET REPORTS FROM NEWS Outdated, inaccurate

  35. WE GET REPORTS FROM OTHER PLACES TOO Better, but usually outdated

  36. WHAT WE WANT IS

  37. ACTIONABLE INTELLIGENCE Predicting the future a little bit

  38. MANAGEMENT ISSUES The data is available on all your honeypots

  39. MANAGEMENT ISSUES The data is available on all your honeypots All over the world

  40. MANAGEMENT ISSUES The data is available on all your honeypots All over the world In all your log files and databases

  41. MANAGEMENT ISSUES The data is available on all your honeypots All over the world In all your log files and databases And the malware is there too

  42. MANAGEMENT ISSUES The data is available on all your honeypots All over the world In all your log files and databases And the malware is there too Just SCP everything and then analyze it ?!?

  43. CHANGING THE WAY IT WORKS

  44. GOALS • Easy Installation • Secure communication • Automatic & Central Analysis

  45. THE STRUCTURE

  46. Honeypots all over the place

  47. Minimal analysis scripts on the honeypot servers analysis scripts

  48. Logstash processing log files analysis scripts logstash

  49. Stunnel listening to send data securely to server analysis scripts logstash stunnel

  50. Stunnel on server listening for data stunnel analysis scripts logstash stunnel

  51. Redis acts as a data broker stunnel redis analysis scripts logstash stunnel

  52. Logstash further processing files and logs stunnel redis logstash analysis scripts logstash stunnel

  53. Analysis scripts (python) doing stuff stunnel redis logstash analysis scripts analysis scripts logstash stunnel

  54. Data is sent to elasticsearch or mongodb stunnel redis logstash analysis scripts elasticsearch mongodb analysis scripts logstash stunnel

  55. Kibana for dashboard, flask for intelligence display stunnel redis logstash analysis scripts elasticsearch mongodb Flask Kibana analysis scripts logstash stunnel

  56. EASY INSTALLATION One Shell script

  57. CLIENT INSTALLATION One Shell script

  58. CLIENT SCRIPTS Gets the sha256 hash for any malware samples and writes information to a file for Logstash. Reads tty files from ssh honeypot and saves output to normal text files for Logstash

  59. Runs on the client, plays the ssh log files 
 and saves to text for processing

  60. Want to find out who owns this IP? 
 You can copy/paste all day or look it up programmatically.

  61. What whois looks like when you copy/paste to your whois search

  62. What it looks like when you copy/paste into virustotal

  63. Programmatically instead of copy/paste Intel as seen on HoneyPot server Information from OpenDNS Investigate (not a sales pitch, just an example)

  64. Programmatically instead of copy/paste

  65. It’s better to have the honeypot server do all that for you

  66. FILES FROM HONEYPOTS Log files get pushed to the server from all the honeypots:

  67. PROCESSING LOGS These run on the server

  68. PROCESSING LOGS These run on the server • virustotal_api.py 
 Read hashes and send to VirusTotal • conpot_reader.py 
 Read conpot logs, Look up info, format for database • cowrie_log_analysis.py 
 Read ssh logs, Look up info, format for database • gaspot_reader.py 
 Read gasp logs, Look up info, format for database

  69. EXTRA SPECIAL THINGS • VirusTotal API • OpenDNS Investigate • More coming… • Send to Cuckoo and/or malwr.com • Other options that don’t cost $$$

  70. OTHER THINGS YOU MIGHT NEED

  71. METRICS • A Dashboard (I googled ‘ugliest dashboard’) …ew

  72. METRICS • A Dashboard • Searching

  73. METRICS • A Dashboard • Searching • Threat map 
 (management NEEDS it)

  74. VIEW OF MY DASHBOARD ! ! ! ! ! ! P A M T A E R H T

  75. VIEW OF SEARCHING

  76. GETTING INTEL

  77. GETTING INTEL

  78. GETTING INTEL

  79. GETTING INTEL

  80. IN PROGRESS • Dionaea Reader • Passive DNS • Malwr Analysis • Download malware • Docker images for various honeypots

  81. AND MOST IMPORTANT

  82. REAL ANALYSIS

  83. FINDING PATTERNS

  84. PATTERNS, ETC

  85. TIME SERIES ANALYSIS

  86. EXAMPLES: Video of using python and pandas for analysis

  87. DIFFERENT TYPES OF ANALYSIS Attack times based on location Malware based on type of honeypot Data based on current events Attacks based on your industry

  88. CURRENT MODIFICATIONS Actually in the works at the time of this presentation

  89. CURRENT MODIFICATIONS Compartmentalizing

  90. CURRENT MODIFICATIONS Adding identifiers to each honeypot server

  91. CURRENT MODIFICATIONS Adding identifiers to each honeypot server Creating docker images for honeypots Adding dynamic information to the dashboard for pattern matching

  92. A CLOSER LOOK

  93. Video or Demo of intelligence portion

  94. Video or Demo of intelligence portion

  95. Go get it https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet https://github.com/jpyorre/IntelligentHoneyNet cisco.com, opendns.com, gmail.com jpyorre@ @joshpyorre

  96. REFERENCES GASPOT http://www.trendmicro.com/cloud-content/us/pdfs/security-intelligence/white-papers/ wp_the_gaspot_experiment.pdf COWRIE (SSH HoneyPot) https://github.com/micheloosterhof/cowrie CONPOT (SCADA HoneyPot) http://www.conpot.org/

Recommend


More recommend