Nettime-l on Wed, 27 Jun 2001 20:10:08 +0200 (CEST)


[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Nettime-bold] Re: <nettime> Honeypots and the Honeynet Project



You wrote:

>[via: Felix Stalder <felix@openflows.org>]
>
>
>From: Bruce Schneier <schneier@counterpane.com>
>CRYPTO-GRAM June 15, 2001
>Back issues are available at
><http://www.counterpane.com/crypto-gram.html>.
>
><...>
>
>       Honeypots and the Honeynet Project
>
> In warfare, information is power. The better you understand your enemy,
>the more able you are to defeat him. In the war against malicious hackers,
>network intruders, and the other black-hat denizens of cyberspace, the
>good guys have suprisingly little information. Most security
>professionals, even those designing security products, are ignorant of the
>tools, tactics, and motivations of the enemy. And this state of affairs is
>to the enemy's advantage.
>
>The Honeynet Project was initiated to shine a light into this darkness.
>This team of researchers has built an entire computer network and
>completely wired it with sensors. Then it put the network up on the
>Internet, giving it a suitably enticing name and content, and recorded
>what happened. (The actual IP address is not published, and changes
>regularly.) Hackers' actions are recorded as they happen: how they try to
>break in, when they are successful, what they do when they succeed.
>
>The results are fascinating. A random computer on the Internet is scanned
>dozens of times a day. The life expectancy of a default installation of
>Red Hat 6.2 server, or the time before someone successfully hacks it, is
>less than 72 hours. A common home user setup, with Windows 98 and file
>sharing enabled, was hacked five times in four days. Systems are subjected
>to NetBIOS scans an average of 17 times a day. And the fastest time for a
>server being hacked: 15 minutes after plugging it into the network.
>
>The moral of all of this is that there are a staggering number of people
>out there trying to break into *your* computer network, every day of the
>year, and that they succeed surprisingly often. It's a hostile jungle out
>there, and network administrators that don't take drastic measures to
>protect themselves are toast.
>
>The Honeynet Project is more than a decoy network of computers; it is an
>ongoing research project into the modus operandi of predatory hackers. The
>project currently has about half a dozen honeynets in operation. Want to
>try this in your own network? Several companies sell commercial versions,
>much simpler, of what the Honeynet Project is doing. Called "honeypots,"
>they are designed to be installed on an organization's network as a decoy.
>In theory, hackers find the honeypot and waste their time with it, leaving
>the real network alone.
>
>I am not sold on this as a commercial product. Honeynets and honeypots
>need to be tended; they're not the kind of product you can expect to work
>out of the box. Commercial honeypots only mimic an operating system or
>computer network; they're hard to install correctly and much easier to
>detect than the Honeynet Project's creations. And what's the point? You'd
>be smarter to monitor activity on your real network and leave off the
>honeypot. If you're interested in learning about hackers and how they
>work, by all means purchase a honeypot and take the time to use it
>properly. But if you're just interested in protecting your own network,
>you'd be better off spending the time on other things.
>
>The Honeynet Project, on the other hand, is pure research. And I am a
>major fan. The stuff they produce is invaluable, and there's no other
>practical way to get it. When an airplane falls out of the sky, everyone
>knows about it. There is a very public investigation, and any airline
>manufacturer can visit the National Traffic Safety Board and read the
>multi-hundred-page reports on all recent airline crashes. And any airline
>can use that information to design better aircraft. When a network is
>hacked, it almost always remains a secret. More often than not, the victim
>has no idea he's been hacked. If he does know, there is enormous market
>pressure on him not to go public with the fact. And if he does go public,
>he almost never releases detailed information about how the hack happened
>and what the results were.
>
>This paucity of real information makes it much harder to design good
>security products. The Honeynet Project team is working to change that. I
>urge everyone involved in computer security to visit their Web site. Great
>stuff, and it's all real.
>
><http://project.honeynet.org>
>
>The "Know Your Enemy" series of essays:
><http://project.honeynet.org/papers/>
>
>Articles:
><http://www.zdnet.com/zdnn/stories/news/0,4586,2666273,00.html>
><http://news.cnet.com/news/0-1014-201-5784065-0.html>
><http://www.linuxsecurity.com/feature_stories/feature_story-84.html>
><http://www.computerworld.com/rckey73/story/0,1199,NAV63_STO59072,00.html>
>
>
>** *** ***** ******* *********** *************
>
><....>
>
>Copyright (c) 2001 by Counterpane Internet Security, Inc.
>
>
>
>
>
>#  distributed via <nettime>: no commercial use without permission
>#  <nettime> is a moderated mailing list for net criticism,
>#  collaborative text filtering and cultural politics of the nets
>#  more info: majordomo@bbs.thing.net and "info nettime-l" in the msg body
>#  archive: http://www.nettime.org contact: nettime@bbs.thing.net
>


_______________________________________________
Nettime-bold mailing list
Nettime-bold@nettime.org
http://www.nettime.org/cgi-bin/mailman/listinfo/nettime-bold