Re: Honeypot detection and countermeasures

From: miguel.dilajat_private
Date: Wed Jun 18 2003 - 00:53:39 PDT

  • Next message: vruyat_private: "SMB "sniffer""

    Hi Larry
    
    As a general rule, if I've been hired for a pen-test, I don't worry too 
    much about being detected by a honeypot (but on the personal side, perhaps 
    I'll feel a little bad ;-)
    Some times, when there's a honeypot (or even NIDS), I've been informed in 
    advance, some times not... it's up to the company that's hiring me, but I 
    think that this always came on the table when we discussed the results.
    A honeypot can usually be seen as low hanging fruit (not a general rule), 
    at least when comparec with other systems on the same network. So you've 
    to distrust such a system.
    Other than distrusting the low hanging fruit, a honeypot could be seen as 
    a "no-clear-purpose" machine. So this is another bit to add to your 
    "distrust feeling".
    There're some very clear cases, for example a host with DTK with default 
    installation, that can be easily avoided upon detecting them.
    Cheers,
    
    Miguel
    aka Nekromancer
    
    
    
    
    
    
    Larry Colen <lrcryptoat_private>
    17/06/2003 23:03
    
     
            To:     pen-testat_private
            cc: 
            Subject:        Honeypot detection and countermeasures
    
    
    Do you worry about being detected by honeypots?
    
    When you do a pen-test, do you already know of the existence of
    honeypots, and their location, so that it is an easy matter to avoid
    them?
    
    If you are concerned about honeypots, how do you test to see if the
    system under attack is a honeypot or a production machine?
    
    
    
    ---------------------------------------------------------------------------
    Attend the Black Hat Briefings & Training, July 28 - 31 in Las Vegas, the 
    world's premier technical IT security event! 10 tracks, 15 training sessions, 
    1,800 delegates from 30 nations including all of the top experts, from CSO's to 
    "underground" security specialists.  See for yourself what the buzz is about!  
    Early-bird registration ends July 3.  This event will sell out. www.blackhat.com
    ----------------------------------------------------------------------------
    



    This archive was generated by hypermail 2b30 : Wed Jun 18 2003 - 10:06:24 PDT