Penetration Testing mailing list archives

RE: Honeypot detection and countermeasures


From: "Bojan Zdrnja" <Bojan.Zdrnja () LSS hr>
Date: Wed, 25 Jun 2003 16:54:49 +1200



-----Original Message-----
From: Michael Boman [mailto:michael.boman () securecirt com] 
Sent: Wednesday, 25 June 2003 2:03 a.m.
To: Rob Shein
Cc: 'John Public'; 'Larry Colen'; 'Brass, Phil (ISS 
Atlanta)'; pen-test () securityfocus com; 'Lance Spitzner'
Subject: RE: Honeypot detection and countermeasures

Seriously, would you pay big bucks for someone to run Nessus 
against the
systems when you can just DIY such test yourself?

I had to comment on this ...

Keep in mind that tools aren't everything as well!

*Anyone* can probably run Nessus or ISS against your host, but can everyone
read it's results? Can everyone point possible weaknesses in your security?
_Of course not_, and that's why you hire external penetration testers who
have experts for those fields.

Regarding honeypots - as Lance said, there are many, many types of
honeypots. Some are really easy to get into, while the other aren't.

Regarding this thread, it's obvious that you can't get tools by only
watching network traffic, but there are million other possibilities to
deploy honeypots, which *can* get tools you need.

I had a honeypot which had 2 network cards. One was connected to the
Internet and the other one was connected to something what looked like a
hardened server in a special DMZ. Now, after honeypot was compromised,
attacker obviously wanted to get to that other server and he had to upload
his tools to honeypot.

This is just one example of possible deployment. YMMV.

Best regards,

Bojan Zdrnja


---------------------------------------------------------------------------
Latest attack techniques.

You're a pen tester, but is google.com still your R&D team? Now you can get 
trustworthy commercial-grade exploits and the latest techniques from a 
world-class research group.

Visit us at: www.coresecurity.com/promos/sf_ept1 
or call 617-399-6980
----------------------------------------------------------------------------


Current thread: