Honeypots
botnet logs Nov 15 2008 12:20PM
Nathan (nathan trav gmail com) (2 replies)
Re: botnet logs Nov 17 2008 09:40AM
Gabriele Zanoni (gabrieleml securenetwork it)
Re: botnet logs Nov 17 2008 03:51AM
Valdis Kletnieks vt edu (1 replies)
On Sat, 15 Nov 2008 13:20:21 +0100, Nathan said:
> I have to make a brief presentation about honeypots and botnets
> relation. I chose honeyd as an example honeypot, i am already running
> it, but due to limited ip resources and short time, I wasn't able to
> gather any valueable information.
> I would be pleased, if anyone could send me a honeyd log of a botnet
> attack (ddos or infecting).

I think you're just a tad confused. For the honeyd log to show anything on
the attack side, one of two things has to be true:

1) The honeyd is being attacked by a botnet. This is a challenge because
you have to draw the botnet's attention to the honeypot and make them attack
it - usually the botnet is busy doing other stuff.

2) The honeyd is running on a host that's part of a botnet. For this to
happen, first it has to be botted into the net - and then the owners of the
honeyd have to allow it to participate in the attack, which is somewhat
morally ambiguous (unless you let it attack but then firewall off the
attack packets along the way).

You're unlikely to find many honeyd logs of a botnet trying to infect a host,
because enough hosts are running Windows XP SP2 or other operating systems
that have a sane firewall by default, so we probably won't see many more
CodeRed/Nimda type worms anymore.

Your best bet is to run honeyd on a host, and then visit a webpage that
has a malware injector on it and capture that. You probably want to run
a tcpdump or other packet-capture program as well to catch the raw network
traffic.

Fortunately, Google is nice enough to mark links that might be malware,
you should try visiting those with a sacrificial-goat machine and let
honeyd and tcpdump record what happens...
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Exmh version 2.5 07/13/2001

iD8DBQFJIOpYcC3lWbTT17ARArp8AJ4+7jPrtk/AFYybwhlgEAb5dFacEgCg4DzZ
y6ajNc2IvBH1oPF5+2+f5c0=
=+ecF
-----END PGP SIGNATURE-----

[ reply ]
Re: botnet logs Nov 17 2008 03:31PM
Nathan (nathan trav gmail com)


 

Privacy Statement
Copyright 2010, SecurityFocus