ebook img

Using Honeypots to Analyze Bots and Botnets - DiVA PDF

207 Pages·2007·1.62 MB·English
by  
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Using Honeypots to Analyze Bots and Botnets - DiVA

Using Honeypots to Analyze Bots and Botnets Eirik Falk Georg Bergande Jon Fjeldberg Smedsrud Master of Science in Communication Technology Submission date: June 2007 Supervisor: Svein Johan Knapskog, ITEM Co-supervisor: André Årnes, Kripos Norwegian University of Science and Technology Department of Telematics Problem Description The students will continue their honeypot-project started in the fall of 2006. The existing honeypot setup will be expanded and further enhanced for collecting and analyzing honeypot data. The experiments will be aimed towards the area of botnets, including automated and manual attacks. A combination of low and high interaction honeypots will be used as parts of an adaptable solution to obtain the best possible security relevant measurements and thereby gain increased knowledge of malicious traffic on the internet. Assignment given: 17. January 2007 Supervisor: Svein Johan Knapskog, ITEM Abstract In this Master thesis we will perform honeypot experiments where we allow malicious users access to systems and analyze their behaviour. Our focus will be on botnets, and how attackers progress to infect systems and add them to their botnet. Our experiments will include both high-interaction honeypots where we let attackers manually access our system, and low interaction-honeypots where we receive automated malware. The high-interaction honeypots are normal Linux distributions accessing the internet through a Honeywall that captures and controls the data flow, while the low-interaction honeypots are running the Nepenthes honeypot. Nepenthes acts by passively emulating known vulnerabilities and downloading the exploiting malware. The honeypots have been connected to both the ITEA and UNINETT networks at NTNU. The network traffic filtering on the IP addresses we have received, has been removed in order to capture more information. Installing the honeypots is a rather complicated matter, and has been described with regard to setup and configuration on both the high and low interaction honeypots. Data that is captures has been thoroughly analyzed with regard to both intent and origin. The results from the high-interaction honeypots focus on methods and techniques that the attackers are using. The low-interaction honeypot data comes from automated sources, and is primary used for code and execution analysis. By doing this, we will gain a higher degree of understanding of the botnet phenomenon, and why they are so popular amongst blackhats. During the experiments we have captures six attacks toward the high-interaction honeypots which have all been analyzed. The low-interaction honeypot, Nepenthes, has captured 56 unique malware samples and of those 14 have been analysed. In addition there has been a thorough analysis of the Rbot. Acknowledgements This thesis is written by Eirik Bergande and Jon Smedsrud, but it would not have been completed without contribution from several people. We would like to thank the following people for helping us: • Professor Svein Johan Knapskog for his guidance and help in shaping this Master thesis. • PhD André Årnes for valuable input, guidance during the writing and proofreading the report. • David Watson, head of the UK honeynet project, for helping us setting up the Nepenthes server. • Pål Sturla Sæther and Asbjørn Karstensen for supplying us with all the equipment we needed during our experiments. • ITEA and UNINETT for letting us use their IP-range. • Ph.D Crina Grosan for translating Romanian IRC chat logs to English. I II Content Abstract.......................................................................................................................................I Acknowledgements.....................................................................................................................I Content.....................................................................................................................................III List of Figures...........................................................................................................................V List of Tables.............................................................................................................................V Abbreviations...........................................................................................................................VI 1 Introduction........................................................................................................................1 1.1 Scope..........................................................................................................................1 1.2 Background................................................................................................................1 1.3 Description.................................................................................................................2 1.4 Structure.....................................................................................................................2 2 Honeynet and honeypots....................................................................................................5 2.1 Honeypots...................................................................................................................5 2.2 Honeynet....................................................................................................................5 2.3 The Nepenthes honeypot............................................................................................9 3 Botnet introduction...........................................................................................................11 3.1 Initial propagation....................................................................................................12 3.2 Execution – the life of the bot begins.......................................................................14 3.3 Controlling the bots..................................................................................................15 3.4 Functionality and services........................................................................................16 3.5 Motives and economics............................................................................................19 4 Botnet trends....................................................................................................................21 4.1 IRC and Domain Name Service...............................................................................21 4.2 Instant Messaging C&C channels............................................................................22 4.3 Web based C&C Servers..........................................................................................22 4.4 Drop Zones and FTP based C&C Servers................................................................23 4.5 Proprietary backdoor C&C channels........................................................................23 4.6 P2P Botnet C&C channels.......................................................................................23 5 Implementation.................................................................................................................25 5.1 Honeynet Implementation........................................................................................25 5.2 Honeypots.................................................................................................................26 5.3 Nepenthes Implementation.......................................................................................28 5.4 Sandnet Analysis Implementation............................................................................30 6 Digital Forensics and Data Analysis................................................................................39 6.1 Data Acquisition.......................................................................................................39 6.2 The Analysis.............................................................................................................41 7 Analysis of the Linux Honeypots.....................................................................................45 7.1 Method.....................................................................................................................45 7.2 Incident Response Plan............................................................................................45 7.3 2007.03.25................................................................................................................48 7.4 2007.04.12................................................................................................................51 7.5 2007.04.25................................................................................................................53 7.6 2007.04.28................................................................................................................56 7.7 2007.04.29................................................................................................................60 7.8 2007.05.04................................................................................................................62 7.9 Summary of the analysis..........................................................................................64 8 Analysis of the Windows Malware..................................................................................69 III 8.1 Sandnet analysis.......................................................................................................69 8.2 Internet analysis........................................................................................................70 8.3 Checklist...................................................................................................................72 8.4 Overview of the Downloaded Nepenthes Malware.................................................74 8.5 Analysis of 8b40c17c0fd9756bf5e9938786962acd.................................................82 8.6 Analysis of c1143d2c458c6ddcf747cf1d07939cfc..................................................85 8.7 Analysis of e9041725b72dff55ec06efd5eb689c4c..................................................89 8.8 Analysis of ed82850e0ff267b4bf662425ba1a6f1f...................................................92 8.9 Analysis of fdec684b580dbb268fa304c485756af9..................................................95 8.10 Analysis of 0ce21e7ea9743f64774df29d47c138c2.................................................99 8.11 Analysis of 5bfd3657259a3f26d00f242487037304...............................................103 8.12 Analysis of 9fea785ca9ef38f32fbdd1ad5b64eea0.................................................107 8.13 Analysis of 41a75fcf84086198bd29ee34e40fcf85.................................................110 8.14 Analysis of f5abfc06a5088f9b0752f786b484024d................................................114 8.15 Analysis of d98b3e6f3425c088934c5005cc3e823e...............................................118 8.16 Analysis of 69fe26256de0d2c718ebd4943822271c..............................................121 8.17 Analysis of b77e035efb29c37cd3bec9ee174daa9b...............................................125 8.18 Analysis of d29188b4e836e52cc45e004ef948389f...............................................131 8.19 In-depth analysis of the RBot.................................................................................133 8.20 The collected Rbot from our Nepenthes honeypot.................................................135 8.21 Summary of the analysis........................................................................................141 9 Conclusion......................................................................................................................149 10 Future Studies.............................................................................................................151 References:.............................................................................................................................153 Web references:......................................................................................................................155 Figure references:...................................................................................................................157 Appendix A: Lab equipment overview............................................................................158 Appendix B: Extracting Sebek data from the Honeywall................................................159 Appendix C: Translated IRC Log from March 25-26.....................................................160 Appendix D: Honeywall Web interface – Walleye.........................................................169 Appendix E: HONEYWALL.CONF...............................................................................172 Appendix F: Command Reference for the Rbot..............................................................179 Appendix G: The RxBot2006 C++ files..........................................................................186 Appendix H: Tenpo.bat and 1.reg – Rbot Registry Changes...........................................190 Appendix I: Nepenthes installation....................................................................................194 Appendix J: Thwarting VMware detection mechanisms....................................................195 Appendix K: Overview of the Rbot Source Files............................................................196 Appendix L: Rbot logged in to the IRC test server.........................................................197 IV List of Figures Figure 1: Honeynet Architecture [fig1]......................................................................................6 Figure 2: Bots and botnets [fig2]..............................................................................................12 Figure 3: Infection/propagation methods [fig2].......................................................................13 Figure 4: Honeynet lab.............................................................................................................27 Figure 5: The honeynet lab.......................................................................................................27 Figure 6: Sandbox picture of psax............................................................................................58 Figure 7: Sandbox picture of SSH scanner execution..............................................................58 Figure 8: Inbound connections toward 129.241.189.2, ITEA..................................................65 Figure 9: Inbound connections toward 158.38.144.2, UNINETT...........................................66 Figure 10: Inbound connections toward 129.241.189.3, ITEA................................................66 Figure 11: Inbound connections toward 158.28.144.3, UNINETT.........................................67 Figure 12: Inbound connections on all honeypots...................................................................67 Figure 13: Number of SSH scan towards the honeynet...........................................................68 Figure 14: We are logged in to one of our test bots.................................................................70 Figure 15: Infection notice for installing Adware..................................................................126 Figure 16: Registry Cleaner...................................................................................................127 Figure 17: Desktop after infection.........................................................................................130 Figure 18: Malware size.........................................................................................................144 Figure 19: DNS C&C Servers................................................................................................144 Figure 20: IP adresses C&C Servers......................................................................................145 Figure 21: Ports used by C&C Servers..................................................................................145 List of Tables Table 1: Nepenthes honeynet server modules..........................................................................10 Table 2: Filenames and hashes from the attack, 2007.03.25....................................................48 Table 3: Filenames and hashes from the attack, 2007.04.12....................................................51 Table 4: Filenames and hashes from the attack, 2007.04.25....................................................53 Table 5: Filenames and hashes from the attack, 2007.04.28....................................................56 Table 6: Filenames and hashes from the attack, 2007.04.29....................................................60 Table 7: Filenames and hashes from the attack, 2007.05.04....................................................62 Table 8: Malware samples received on both network with infection date.............................142 V Abbreviations CD Compact Disc DDoS Distributed Denial of Service DNS Domain Name Server FTP File Transfer Protocol HTTP HyperText Transfer Protocol HTTPS Hypertext Transfer Protocol Secure ICMP Internet Control Message Protocol IDS Intrusion Detection System IIS Internet Information Services IP Internet Protocol IPS Intrusion Prevention System IRC Internet Relay Chat ISP Internet Service Provider ITEA IT-seksjonen ved NTNU LAN Local Area Network LCD Liquid Crystal Display MAC Medium Access Control MD5 Message-Digest Algorithm 5 MSN Microsoft Network NetBIOS Network Basic Input/Output System NTNU Norges Teknisk-Naturvitenskapelige Universitet (Norwegian University of Science and Technology) OS Operating System P2P Point-to-point PC Personal Computer PHISHING Password Harvesting Fishing RPC Remote Procedure Call SANS SysAdmin, Audit, Network, Security Institute SCP Secure Copy SHA-1 Secure Hash Algorithm 1 SMB Server Message Block SOCKS SOCKetS SQL Structured Query Language SSH Secure Shell SSL Secure Socket Layer TCP Transmission Control Protocol TTL Time to Live UDP User Datagram Protocol URL Uniform Resource Locator VI

Description:
of malicious traffic on the internet. and low interaction-honeypots where we receive automated malware. The high-interaction .. 4.3 Web based C&C Servers.
See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.