Proven tradition out in the wild. I gather there are SSH honeypots that allow logins with trivial attempts (pi/raspberry, admin/admin..), then simply record which commands the attacker runs first. Usually they'll be scripted commands to scope out the compromised system, and if it passes muster it dials home.

I don't think those honeypots are designed to make much of a human attacker, but they allow rapid identification and classification of who's attacking and offer some scope for countermeasures.

For example, if your attacker is running a certain command and capturing a certain form of expected output, what happens if your honeypot gives it too much, or a different kind of output? :) Is your automated attacker using SQL to store attack data? I hope it's escaping input.. Is your attacker using stars in any commands ('grep foobar *')? Did you know you can have filenames that look like shell command flags and bash will uncritically pass them as arguments?

On 03/02/15 18:55, Natanael wrote:
Den 3 feb 2015 19:19 skrev "coderman" <[email protected]
<mailto:[email protected]>>:
 >
 > On 2/3/15, [email protected] <mailto:[email protected]> <[email protected]
<mailto:[email protected]>> wrote:
 > > ...
 > > John, you know this I'm sure, but for the record the highest
 > > security places use sacrificial machines to receive e-mail and
 > > the like, to print said transmissions to paper, and then those
 > > (sacrificial) machines are sacrificed, which is to say they
 > > are reloaded/rebooted.  Per message.  The printed forms then
 > > cross an air gap and those are scanned before transmission to
 > > a final destination on networks of a highly controlled sort.
 > > I suspect, but do not know, that the sacrificial machines are
 > > thoroughly instrumented in the countermeasure sense.
 >
 > this is defense to depths layered through hard experience lessons ;)
 >
 >
 >
 > > ...  For the
 > > entities of which I speak, the avoidance of silent failure is
 > > taken seriously -- which brings us 'round to your (and my)
 > > core belief: The sine qua non goal of security engineering is
 > > "No Silent Failure."
 >
 > there was an interesting thread here last year on instrumenting
 > runtimes to appear stock (vulnerable) but which fail in obvious ways
 > when subversion is attempted. (after all, being able to observe an
 > attack is the first step in defending against such a class...)
 >
 > "hack it first yourself, before your attacker does..."

Canary bugs / honeypot bugs?


--
Scientific Director, IndieBio Irish Programme
 Got a biology-inspired business idea that $50,000 -
 & 3 months in a well equipped lab could accelerate?
 Apply for the Summer programme in Ireland:
 http://indie.bio/apply-to-ireland
Twitter:  @onetruecathal
Phone: +353876363185
miniLock: JjmYYngs7akLZUjkvFkuYdsZ3PyPHSZRBKNm6qTYKZfAM
peerio.com: cathalgarvey

Reply via email to