ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics - PowerPoint PPT Presentation

1 / 19
About This Presentation

ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics


ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel – PowerPoint PPT presentation

Number of Views:91
Avg rating:3.0/5.0
Slides: 20
Provided by: School220


Transcript and Presenter's Notes

Title: ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics

ECE4112 Lab 7 Honeypots and Network Monitoring
and Forensics
  • Group 13 Group 14
  • Allen Brewer
  • Jiayue (Simon) Chen
  • Daniel Chu
  • Chinmay Patel

  • Honeypot
  • Definition in lab system whose value lies in
    being probed, attacked, or otherwise taken
    advantage of by blackhat.
  • Responds to the user informing hacker has
    attempted an attack on system
  • Two types
  • Production Honeypots alerts user of an attack
  • Research Honeypots tracks hackers actions

  • Intrusion Detection System (IDS)
  • Monitors traffic and suspicious activities
  • Alerts the network administrator
  • May respond to malicious traffic by blocking user
    or source IP address from accessing the network

Section 1 BackOfficerFriendly
  • Known for its ability to attract and trap hackers
  • For exercise, attempted a connection from RH 4.0
    to windows using telnet
  • Outcome?
  • Source IP Address, username and passwords
  • Why use BOF?
  • Prevent hackers

Section 2 Homemade Honeypot using Netcat as a
Port Sniffer
  • Offers more options than BOF
  • Monitored and stored sent data
  • Data was sent from RH 4.0 to RH 7.2 machine
  • Should be able to see the file

Section 3 Capturing Packets using Ethereal
  • Packets observed using Telnet
  • TCP telnet packets to port 23
  • Content of packets
  • They contained single characters.
  • Packets observed using IMAP
  • SMB packets
  • Content of packets
  • The commands from the imapd client

Section 4 Set up and use Snort to capture packets
  • Snort
  • Similar to Ethereal
  • Three modes Sniffer, Packet Logger, Network
    Intrusion Detection
  • How l option organizes logging of network
  • A new directory was created for each IP, with
    subdirectories for each type of packet sent.

Section 5 Scan of the Month Challenge
  • Challenge is to determine hackers activity and
    how it was accomplished
  • Hackers IP
  • Hackers first activity Initializes the backdoor
    to respond to one specific IP
  • Purpose of foo To gather email address and
    send them via UDP to particular host
  • How foo will be used? To spam, sell
    addresses, create havoc

Section 6 Using SNORT to act as an IDS
  • Create rules to generate alerts and logs of
    suspicious packets.
  • Rule syntaxACTION PROTOCOL IP/mask PORT -gt
    IP/mask PORT (OPTIONS)
  • Rule to detect the imapd-ex attack alert tcp
    any any -gt 143

Section 6 Using SNORT to act as an IDS
  • How to evade detection by SNORT?
  • Send packets out of sequence
  • Retransmit different byte ranges of data
  • Content inspection of packets is expensive. Can
    be easily overloaded with bogus alerts
  • Solution?
  • Support modules portscan and stream4

Section 7 Advanced Uses of Ethereal
  • Conducted forensic analysis of real honeynet data
  • snort-0320_at_0001.log
  • Source IP,,
  • Target IP ,, etc.
  • Duration approximately 8 hours
  • Hacker Activities
  • ARP broadcast for specific internal IP
  • Spoofs this IP
  • Attempts to connect to the corresponding IP with
    various methods/services ARP, FTP, http, ICMP
    (ping), and SNMP.

Section 7 cont.
  • snort-0920_at_0001.log
  • Duration approximately 15 hours
  • Hacker Activities
  • ARP broadcast to find legitimate active IP on
  • Attempts to establish ssh connection
  • http request to execute command on webserver.
  • Script calls windows command line to run a TFTP
    (trivial FTP) client to retrieve remote files
    such as Kill.exe and .ini files on
  • victim webserver copies file from server
  • script performs other operations such as
    deleting, copying, moving files, etc.

Section 7 cont.
  • Security Methods for Prevention
  • Limit the number of ARP broadcasts within a time
  • Packets with destination port value of 80 should
    only be connecting to networks web server
  • Secure neighboring routers, own router,
    neighboring subnets to prevent hackers from
    compromising a system and sending ARP broadcasts.

Section 8 Introduction to AIDE
  • Used AIDE (Advanced Intrusion Detection
    Environment) to detect system changes
  • Creates checksums of files for later comparison
  • Drawback AIDE must be run before an attack
  • Where should the clean copy be stored?

Section 8 cont.
  • aide check after adding a new user

Section 8 cont.
  • Overwriting /bin/login with lrk4 login file

Section 9 Snare for Windows
  • System iNtrusion Analysis Reporting Environment
  • View specific details of system events
  • How is Snare useful for our purposes?
  • Whats the benefit in having remote control

Section 10 Forensics Investigation the Penguin
Sleuth Kit
  • Bootable Linux distribution based on KNOPPIX.
  • Using Penguin Sleuth for postmortem forensic
  • Using Autopsy to analyze hard drive image
  • Generate time line of what happened on a system
  • Is there a Windows Alternative?

  • ?
Write a Comment
User Comments (0)