Cover V12, I03

Article

mar2003.tar

syslog

Last August, I described the Honeynet Project and its goals of raising awareness of Internet threats and vulnerabilities. In that column, I mentioned Lance Spitzner's book "Honeypots: Tracking Hackers", which was released in September of 2002. On his Web site (http://www.spitzner.net), Spitzner defines a honeypot as "a security resource whose value lies in being probed, attacked or compromised". He says, "A honeypot may be a system that merely emulates other systems or applications, creates a jailed environment, or may be a standard built system. Regardless of how you build and use the honeypot, its value lies in the fact that it is attacked."

The following information was taken from Spitzner's "Tracking Hackers" Web site: http://www.tracking-hackers.com. There he provides this list of open source honeypots:

  • BackOfficer Friendly (BOF) http://www.nfr.com/products/bof/ -- BOF is a free Windows-based honeypot designed to be used as a burglar alarm. Written by Marcus Ranum and the NFR folks in 1998, BOF is extremely easy to use and runs on any Windows platform. However, it is very limited and can listen on only 7 ports. If you have never installed a honeypot before, this is a great place to start.
  • BigEye http://violating.us/projects/bigeye/ -- An open source network dumping utility that has some basic service emulation capabilities.
  • Deception Toolkit http://www.all.net/index.html -- DTK was the first open source honeypot, released in 1997. Written by Fred Cohen, DTK is a collection of Perl scripts and C source code that emulates a variety of listening services. Its primary purpose is to deceive human attackers. This tool is dated, but one of the first honeypots ever released.
  • LaBrea Tarpit http://www.hackbusters.net/LaBrea.html -- This open source honeypot is unique in that it is designed to slow down or stop attacks. It can run on Windows or Unix.
  • Honeyd http://www.citi.umich.edu/u/provos/honeyd/ -- This is a new open source honeypot, released by Niels Provos in 2002. Honeyd, written in C and designed for Unix platforms, introduces a variety of new concepts, including the ability to monitor millions of unused IPs, perform IP stack spoofing, and simulate hundreds of operating systems, at the same time. It also monitors all UDP and TCP based ports. You can try out Honeyd with the Linux Honeyd Toolkit. A toolkit containing all the configuration files, precompiled static binaries, and startup scripts to get Honeyd instantly up and running on your Linux computer.
  • Honeynets http://www.honeynet.org/papers/honeynet/ -- These are entire networks of systems designed to be compromised. Honeynets are the most complex honeypot solutions and have the greatest risk. However, they can also capture the most information of any honeypot.
  • Sendmail SPAM Trap http://www.tracking-hackers.com/solutions/sendmail.html -- This honeypot identifies Spammers and captures their SPAM, without relaying it to any victims. Best of all, it's very easy to set up.
  • Tiny Honeypot http://www.alpinista.org/thp/ -- Written by George Bakos, Tiny Honeypot is unique in that it always appears vulnerable. No matter what attack a hacker launches, it will appear successful. Great tool for collecting all sorts of information on the bad guys.
  • User Mode Linux http://user-mode-linux.sourceforge.net/ UML -- An Open Source solution that allows you to run multiple operating systems (and honeypots) at the same time. Its creator Jeff Dike has added unique honeypot functionality, such as the ability to capture the attacker's keystrokes from kernel space. UML allows you to create an entire Honeynet on a single computer. UML is currently limited to the Linux operating system.

Good luck tracking your intruders.

Sincerely yours,

Amber Ankerholz
Editor in Chief