Intrusion Detection Honeypots: Detection through Deception by Sanders Chris

Intrusion Detection Honeypots: Detection through Deception by Sanders Chris

Author:Sanders, Chris [Desconocido]
Language: eng
Format: epub
Publisher: Applied Network Defense
Published: 2021-03-01T06:00:00+00:00


Leaving credentials lying around on public file shares likely to be accessed in a compromise.

Utilizing default credentials from common services or devices (cisco:x:cisco). This works best if you also mimic other characteristics of the device.

The changes made to userdb.txt take effect immediately and don’t require restarting Cowrie.

Building a More Legitimate File System

When an attacker logs into the SSH honeypot, Cowrie presents them with what appears to be a functioning file system. They can use the ls command to list the contents of directories, the cd command to change into them, and even use the cat command to read out files. The file system looks and feels real at a basic level, but it’s all fake and made possible through a database of directories and associated files served up by Cowrie. They aren’t actually interacting with a real file system. Any time a user logs in, Cowrie gives them a copy of this file system to manipulate, which gets deleted after they log off.

While the default file system included with cowrie works for proof of concept, there are a few good reasons to replace it with one of your own creation. First, if you hope to keep an adversary engaged with your honeypot for long, you must give them something interesting to dig through. Second, clever or experienced attackers may easily recognize the vanilla honeypot file system or some of its default attributes. Finally, several of the other changes you’ll likely make to Cowrie should also be reflected in the file system. For example, if you added users to the userdb.txt file, the file system should contain home directories for those users along with entries in /etc/passwd, /etc/shadow, /etc/group, and other related files.

There are two essential components to the Cowrie emulated filesystem. First is the pickle file8 that contains a database of the file system metadata like the directory structure, file names, permissions, ownership, and so on. Next is the cowrie/honeyfs directory containing the file contents. For an attacker to find and view a file, it must be present both in the pickle file and in the honeyfs directory structure. If it’s in the pickle file but not in honeyfs, they’ll find the file, but it won’t have any contents. If it’s in honeyfs but not in the pickle file, they won’t be able to see it in the directory structure.

Creating a pickle file is most effectively done by deploying a reference OS that you’ll use as the basis for your fake file system. For example, if you’re mirroring an Ubuntu 18 system, deploy a copy of Ubuntu in a VM and configure that file system as you’d want your attacker to view it. From there, complete the following steps:

On your honeypot, move the existing honeyfs directory into a backup location:

mv honeyfs/ backupfs/



Download



Copyright Disclaimer:
This site does not store any files on its server. We only index and link to content provided by other sites. Please contact the content providers to delete copyright contents if any and email us, we'll remove relevant links or contents immediately.
Popular ebooks
Eco-friendly approach of bio-indigo synthesis and developing purification methods towards isolation of indigo from indirubin and bacterial fragments by Ramalingam Manivannan & Kaliyan Prabakaran & Young-A Son(206449)
Personalized inhaled bacteriophage therapy for treatment of multidrug-resistant Pseudomonas aeruginosa in cystic fibrosis by unknow(174872)
CONSORT 2025 statement: updated guideline for reporting randomized trials by unknow(83267)
Critical evaluation of the ProfiLER-02 study design and outcomes by Vivek Subbiah & Razelle Kurzrock(82943)
Cardiac gene therapy makes a comeback by Oliver J. Müller & Susanne Hille & Anca Kliesow Remes(82776)
Whisky: Malt Whiskies of Scotland (Collins Little Books) by dominic roskrow(74436)
Unveiling the design rules for tunable emission in graphene quantum dots: A high-throughput TDDFT and machine learning perspective by Şener Özönder & Mustafa Coşkun Özdemir & Caner Ünlü(50891)
A yeast-based oral therapeutic delivers immune checkpoint inhibitors to reduce intestinal tumor burden by unknow(40259)
Covalent hitchhikers guide proteins to the nucleus by Alexander F. Russell & Madeline F. Currie & Champak Chatterjee(40215)
Meet the Authors: Christopher R. Mansfield and Emily R. Derbyshire by Christopher R. Mansfield & Emily R. Derbyshire(40094)
Alkaline-earth metals promote propane dehydrogenation with carbon dioxide through geometric effects: Altering the reaction pathway by unknow(32730)
Induced iron vacancies boosting FeOOH loaded on sustainable Fenton-like collagen fiber membrane for efficient removal of emerging contaminants by unknow(32504)
Efficient electric-field-assisted photochemical conversion of methane to n-propanol exclusively over penetrated TiO2Ti hollow fibers by Guanghui Feng(32452)
Bi2SiO5 nanosheets as piezo-photocatalyst for efficient degradation of 2,4-Dichlorophenol by Hangyu Shi & Yifu Li & Lishan Zhang & Guoguan Liu & Qian Zhang & Xuan Ru & Shan Zhong(32384)
A novel NDIPTA organic heterojunction photocatalyst with built-in electric field for efficient hydrogen production by Jiahui Yang & Baojun Ma & Yongfa Zhu(32360)
Enhanced conversion of methane to liquid-phase oxygenates via hollow ferrite nanotube@horseradish peroxidase based photoenzymatic catalysis by Jun Duan & Shiying Fan & Xinyong Li & Shaomin Liu(32330)
Ordered macroporous superstructure of defective carbon adorned with tiny cobalt sulfide for selective electrocatalytic hydrogenation of cinnamaldehyde by Xiao-Shi Yuan & Sheng-Hua Zhou & San-Mei Wang & Wenbo Wei & Xiaofang Li & Xin-Tao Wu & Qi-Long Zhu(32256)
What's Done in Darkness by Kayla Perrin(27144)
Topological analysis of non-conjugated ethylene oxide cored dendrimers decorated with tetraphenylethylene: Insights from degree-based descriptors using the polynomial approach by A Theertha Nair & D Antony Xavier & Annmaria Baby & S Akhila(26522)
Investigation of mechanical and self-healing properties of hydroxyl-terminated polybutadiene functionalized with 2-ureido-4-pyrimidinone by Mohsen Kazazi & Mehran Hayaty & Ali Mousaviazar(26457)