Honeypots for Windows (Books for Professionals by Professionals)

Chapter 10 - Honeypot Monitoring
Honeypots for Windows
by Roger A. Grimes
Apress 2005

Monitoring begins with documenting the current honeypot system thoroughly. You cannot figure what has changed if you didn’t know what the beginning state looked like. Taking baselines is the first step in honeypot data collection, as illustrated in Figure 10-1.

Figure 10-1: Honeypot data-collection strategy

Real Windows honeypot baselines are obtained by documenting normal disk/file structures, OS activity, objects and their permissions, and network activity.

Begin by documenting all the network settings, IP addresses, MAC addresses, and routing tables. When trying to follow a hacker’s trail, having your honeypot system’s TCP/IP configuration documented and handy will help in the forensic investigation. Document everything you can about each honeypot, including the following:

If this seems like a lot of information, it is! But without it, finding out what the hacker manipulated or changed could be difficult. Use automated data-collection programs when you can, and manually document only when you must.

Microsoft has plenty of free tools that can help you collect the information listed here. Table 10-1 shows a random sampling of Microsoft tools that you can use to document baseline settings. Most of the tools listed in Table 10-1 are available in Windows 2000 and later, and are installed by default. However, third-party vendor tools often do the job better. This chapter will cover many third-party utilities, along with the Microsoft ones.

Table 10-1: Microsoft Tools for Gathering Baseline Information

Baseline Attribute

Microsoft Tool

Network traffic type and levels

Performance Monitoring, Network Monitor, System Monitor

Network settings

Ipconfig.exe, Netsh.exe, Arp.exe

Network ports

Netstat.exe

Boot configuration settings

Bootcfg.exe /query

User and computer objects

Dsquery (in domain environment), Active Directory Users and Computers queries, Net.exe

NTFS file and Registry permissions

Cacls.exe, Regedit.exe, Regedt32.exe

Shares and permissions

Computer Management snap-in, Dacls.exe, Net.exe

User privileges

Group Policy Management Console, Resultant Set of Policy (RSoP) snap-in, Whoami.exe (in 2003 only), Local Security Policy

Logon and authentication protocols (anonymous, LM, NTLM, and Kerberos)

Group Policy Management Console, RSoP

Password and account lockout policies

Group Policy Management Console, Local Security Policy, Net.exe

IPSec policies

Netsh.exe, Ipsecpol.exe, IPSec Microsoft Management Console (MMC) snap-in

Disk configuration, file system type, total volume or partition size, used space, free space

Diskpart.exe, Disk Management MMC snap-in, Chkdsk.exe, Fsutil.exe

Installed device drivers

Driverquery.exe, Computer Management snap-in

Files and directories (names, locations, sizes, dates, signature)

Dir, Sigverif.exe, Windows Explorer, Dacls.exe

Groups (local, and otherwise), group memberships, permissions, SIDs

Net.exe, Group Policy Management Console

Processes

Task Manager

Services (status, startup type, and logon service account name and password)

Net.exe, Group Policy Management Console

Normal event log messages during operating, startup, and shutdown

Event Log, Event Viewer, Computer Management snap-in, EventCombMT.exe, LogParser.exe

Programs that run automatically each time the computer starts

Msconfig.exe, Dr. Watson (also Sysinternal’s Autoruns.exe, described in the “Monitoring Programs” section in this chapter)

Local Computer Policy and Group Policy Objects

Group Policy Management Console, Local Security Policy, GPResult.exe, RSoP, Secedit.exe

Digital certificates

Certificates MMC snap-in, Certutil.exe

Note 

Most baseline programs can also double as monitoring utilities when used to compare original state data against later modifications.

Host Baselines

There are dozens of free and commercial baseline programs available to document current computer settings and compare them again at a later date for analysis. Here are some of them:

Note 

The disk of the honeypot system should have been formatted first before installing the honeypot software or OS. Make sure to do a full format, not a quick format (which just erases file location markers but leaves the old data still on the disk). You want the disk system to be void of all non-honeypot data. This step will make data analysis (discussed in Chapter 11), after the honeypot is compromised, significantly easier. If you forget this step, when you find data on the disk, you might not know what is the new data and what was left on the disk from the computer’s previous use (if the computer was not new).

Network Baselines

It is important that you get network traffic baselines on your honeynet and each honeypot within the system. You need to know which network traffic characteristics are normal and which are abnormal. Do this by summarizing network utilization over a period of days that are representative of noncompromised behavior. Because this is a honeypot system, network traffic within the honeynet should be nonexistent or minimal. Expect to see some default traffic coming from NetBIOS queries, other Windows network broadcasts, and from normal network device traffic (such as spanning-tree broadcasts from a switch or bridge).

You want to record network traffic volumes and LAN utilization, as well as which network ports are listening for connections on the honeypot. Be sure to note which protocols are used and where traffic originates from and heads to.

Any network traffic analyzer will do, but certainly Ethereal and Snort (covered in Chapter 9) can do the job well. Hardcore fanatics can use the barebones WinDump (http://windump.polito.it) to collect network packets. These packets can then be analyzed by any network traffic analyzer that supports tcpdump-style input files. You can use any of the network monitoring products to trigger an alert action if network traffic is detected on the honeypot system.

You can use an assortment of utilities to collect network baseline data:

Категории