A Client Honeypot

A Client Honeypot

MASARYKOVA UNIVERSITY FACULTY OF INFORMATICS A CLIENT HONEYPOT MASTER’S THESIS BC. VLADIMÍR BARTL BRNO, FALL 2014 STATEMENT OF AUTHORSHIP Hereby I declare that this thesis is my original work, which I accomplished independently. All sources, references and literature I use or refer to are accurately cited and stated in the thesis. Signature:............................................ i ACKNOWLEDGEMENT I wish to express my gratitude to RNDr. Marian Novotny, Ph.D. for governance over this thesis. Furthermore, I wish to thank my family and my girlfriend for their support throughout the process of writing. TUTOR: RNDr. Marian Novotny, Ph.D. ii ABSTRACT This thesis discusses a topic of malicious software giving emphasis on client side threats and vulnerable users. It gives an insight into concept of client honeypots and compares several implementations of this approach. A configuration of one selected tool is proposed and tested in the experiment. KEYWORDS client honeypot, low-interaction, high-interaction, malware, attacker, exploit, vulnerability, Cuckoo Sandbox iii TABLE OF CONTENTS 1 INTRODUCTION .......................................................................................................................... 3 1.1 MOTIVATION ........................................................................................................................ 4 1.2 CONTRIBUTION .................................................................................................................... 6 2 BACKGROUND THEORY ........................................................................................................... 7 2.1 WHAT IS HONEYPOT ........................................................................................................... 8 2.1.1 DEFINITION OF A HONEYPOT ................................................................................................ 9 2.1.2 SERVER VS. CLIENT HONEYPOT ............................................................................................. 9 2.1.3 HONEYPOT BY INTERACTION LEVEL................................................................................... 11 2.1.4 HONEYPOT BY DEPLOYMENT ENVIRONMENT ................................................................... 13 2.2 ATTACKERS ....................................................................................................................... 14 2.2.1 TARGETS OF ATTACKS .......................................................................................................... 16 2.2.2 POSSIBLE MOTIVES ................................................................................................................ 16 2.2.3 STRUCTURE OF AN ATTACK ................................................................................................. 17 2.3 MALWARE ......................................................................................................................... 18 2.3.1 TYPES OF MALWARE ............................................................................................................. 19 2.3.2 ATTACK VECTORS .................................................................................................................. 21 2.3.2.1 HTML ............................................................................................................................ 23 2.3.2.2 JavaScript .................................................................................................................... 23 2.3.2.3 SQL Injection ............................................................................................................. 24 2.3.2.4 Cross-site scripting ................................................................................................. 25 2.3.2.5 Buffer Overflow........................................................................................................ 27 2.3.2.6 Drive-by download attack ................................................................................... 28 2.3.3 PROTECTION TOOLS .............................................................................................................. 32 2.3.3.1 AVG Web TuneUp .................................................................................................... 32 2.3.3.2 McAfee SiteAdvisor ................................................................................................ 33 2.3.3.3 Sandboxie ................................................................................................................... 34 2.3.4 ANALYSIS TOOLS .................................................................................................................... 36 2.3.4.1 urlQuery.net .............................................................................................................. 36 2.3.4.2 VirusTotal.com ......................................................................................................... 38 2.3.4.3 Malwr.com ................................................................................................................. 39 2.3.4.4 herdProtect.com ...................................................................................................... 42 2.3.5 MALWARE RESOURCES REPOSITORIES .............................................................................. 44 3 HANDS ON CLIENT HONEYPOT .......................................................................................... 46 3.1 LOW INTERACTION ........................................................................................................... 46 3.1.1 HONEYC .................................................................................................................................. 46 3.1.2 THUG ....................................................................................................................................... 47 3.1.3 YALIH ...................................................................................................................................... 50 1 3.2 HIGH INTERACTION .......................................................................................................... 53 3.2.1 CAPTUREHPC ........................................................................................................................ 53 3.2.2 STRIDER HONEYMONKEY .................................................................................................... 55 3.2.3 CUCKOO SANDBOX ................................................................................................................ 56 3.2.4 HONEYSPIDER NETWORK 2.0 ............................................................................................ 60 3.3 COMPARING HONEYCLIENTS ............................................................................................ 66 4 CUCKOO SANDBOX ................................................................................................................. 69 4.1 DETAILED DESCRIPTION ................................................................................................... 69 4.1.1 ARCHITECTURE & MODULARITY ......................................................................................... 69 4.1.2 STARTING AN ANALYSIS ....................................................................................................... 71 4.1.3 AN ANALYSIS .......................................................................................................................... 72 4.1.4 OUTPUT OF AN ANALYSIS ..................................................................................................... 73 4.1.5 WEB FRONT-END .................................................................................................................. 74 4.2 DEPLOYING THE HONEYPOT ............................................................................................. 76 4.2.1 HOST OPERATING SYSTEM AND SOFTWARE ...................................................................... 76 4.2.2 GUEST VM SYSTEMS INSTALLATION .................................................................................. 77 5 EXPERIMENT ............................................................................................................................ 80 5.1 CONFIGURATION OF CUCKOO INSTANCE ......................................................................... 80 5.2 DEFINING THE EXPERIMENT ............................................................................................ 82 5.3 PROCESS OF THE EXPERIMENT ......................................................................................... 82 5.4 OUTPUT ............................................................................................................................. 84 5.5 SAMPLE ANALYSIS ............................................................................................................ 87 5.6 EVALUATION ..................................................................................................................... 90 6 SUMMARY .................................................................................................................................. 91 2 1 INTRODUCTION The trends of the modern age of humanity are making a tremendous use of computer technology as well as of the Internet. The escalation of everyday use is exponential. A different kind of computer can be seen almost in every type of an electronic device, but not limited only to these devices. Computers are being operated by a vast amount of people with greatly diverse levels of knowledge and operation skills,

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    100 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us