Beta
×

Welcome to the Slashdot Beta site -- learn more here. Use the link in the footer or click here to return to the Classic version of Slashdot.

Thank you!

Before you choose to head back to the Classic look of the site, we'd appreciate it if you share your thoughts on the Beta; your feedback is what drives our ongoing development.

Beta is different and we value you taking the time to try it out. Please take a look at the changes we've made in Beta and  learn more about it. Thanks for reading, and for making the site better!

Fun Things To Do With Your Honeypot System

Zonk posted more than 8 years ago | from the more-than-just-keeping-bees dept.

136

An anonymous reader writes "Whitedust is running an interesting article on honeypots and their uses. From the article: 'Most papers deal with the potential gains a honeypot can give you, and the proper way to monitor a honeypot. Not very many of them deal with the honeypots themselves... Honeypots can be used to ensnare and beguile potential hackers; entice them to give you more research information, and actively defend your production network."" From the article: "Once an attacker has taken all the trouble to set up shop on your honeypot, he'll probably want to see what else there is to play with. If your honeypot is like most traditional honeypots, there's not much for an attacker to do once he gets in. What you really want if for the attacker to transfer down all the other toys in his arsenal so you can have a copy as well. Giving an attacker additional targets with various operating systems and services can help him decide to give you his toys. The targets can be real, but you'll get almost as much mileage if they're simulated. A good place to start is to put a phantom private network up hung off the back of the honeypot."

cancel ×

136 comments

Sorry! There are no comments related to the filter you selected.

Like I Have That Kind of Time (3, Insightful)

aaronhaley (145305) | more than 8 years ago | (#15812326)

In addition to all of the things on the network I normally have to do at the office let me set up an entire phantom network just to "jack" with hackers. Yeah, I'll get right on that.

Think you missed the point... (0)

Anonymous Coward | more than 8 years ago | (#15812347)

The idea is not to have a good chuckle at script kiddies and such. It's to get some inside info on what kind of tools they use, and how. Which in turn, will allow you to (hopefully) better understand how and where your network may be compromised.

Re:Think you missed the point... (2, Insightful)

aaronhaley (145305) | more than 8 years ago | (#15812375)

No I get the point. I was making a joke, but I still thing it's silly. Why don't you just secure your network and you don't have to worry about it. Unless I worked for a security company or network vendor I wouldn't waste my time trying to score a hacker's toolkit. Unless I'm running something that's home made I don't really need to honeypot it. The # of "real" hackers out there compared to script kiddies is very small. I can download the script kiddie tools myself if I want. Nice AC post by the way.

Re:Think you missed the point... (5, Funny)

heinousjay (683506) | more than 8 years ago | (#15812452)

Why don't you just secure your network and you don't have to worry about it

Oh, is that all? Good to see you've boiled network security down to a single step. I'd say write a book, but it would only have one page so that's probably a waste of your time.

Re:Think you missed the point... (1)

mewp (992107) | more than 8 years ago | (#15812581)

Oh, is that all? Good to see you've boiled network security down to a single step. I'd say write a book, but it would only have one page so that's probably a waste of your time.

Haha owned.

Re:Think you missed the point... (1)

udderly (890305) | more than 8 years ago | (#15812673)

Haha owned.

Supposed to be "pwn3d"

Re:Think you missed the point... (0, Flamebait)

alfs boner (963844) | more than 8 years ago | (#15812689)

You got 0wned [slashdot.org] , dumbass.

Most cool business networks are semi-homemade (1)

billstewart (78916) | more than 8 years ago | (#15813605)

Many business network connections are made of vanilla parts - a web server, Pix or Checkpoint firewall, a VPN appliance for employees to connect from home, mostly static web pages or decorative Flash navigation. Pretty boring, and not much point in breaking in unless you want somewhere to run a zombie server or you're a skr1p7 k1dd13 who still thinks scribbing on websites is way 1337 k3wl. At most there's a pre-packaged e-commerce server that lets you order things with credit cards, but you could have gotten the credit card numbers from professionals, or if you're a professional carder you could have run a pr0n site and ripped off anybody who fell for your "age verification" trap.

But the more interesting networks for a cracker are usually at least semi-custom - they may have some standard components, but maybe they're arranged in some customized combination, or there's a bunch of dynamic-html scripting that wasn't written quite right so there are exploits to look for Maybe it's the database hooks you can feed malicious SQL, or maybe there's something else in there.

I agree that unless you're a security researcher of some kind, you probably don't need a source of new cracker tools - but if you're running a customized production site, you do need to know what's being used to attack you, so you can block against it, whether it's your own company or whether it's a type of service you're providing to multiple customers.

Re:Like I Have That Kind of Time (0)

Anonymous Coward | more than 8 years ago | (#15812378)

If you don't have the time to work out how to analylse how people are attacking your network and part of your job or indeed your job is defending your network; you shouldn't be damn well doing it.

Standard.

Re:Like I Have That Kind of Time (0)

Anonymous Coward | more than 8 years ago | (#15812563)

Not only that but you are not "sticking it to man" by toying with a these crackers because 99.99% of the time, that cracker you are messing with is an automatted script. Wow, you showed that script and automatted process a thing or two. If your hacked box does not respond as it should, it will be treated as one of many that are owned and not quite acting like the other X that are owned by the same script are.
It's not like someone is watching all of these owned PCs and providing them with food, water, and the correct amount of light on an individual basis.

Re:Like I Have That Kind of Time (2, Interesting)

Ant P. (974313) | more than 8 years ago | (#15812723)

Sounds like a good idea for a livecd, actually.

What is Honeypot (3, Informative)

in2mind (988476) | more than 8 years ago | (#15812329)

For those who dont know what a honeypot is: [From Wikipedia.]

____________________________________________
Honeypot is literally the term for a container of honey but is used in several different ways, often playing off the image of sweetness being used as a lure:

* A computer system set up as a trap for attackers; see Honeypot (computing)
* Traps designed to catch conventional criminals; see honey trap

Re:What is Honeypot (2, Informative)

portmapper (991533) | more than 8 years ago | (#15812380)

A honey trap is fun to prepare, but beware of actually beeing exploited. To limit damage, it will help to put a transparent firewall in front of the honeypot and start blocking (perhaps allow a few outbound connections, and then block). You don't want your owned honeyput as a base of attack, do you? The OpenBSD [openbsd.org] packet filter [openbsd.org] has the needed funcionality using an OS that does not have a few local root kernel exploits a month.

Re:What is Honeypot (1)

nv5 (697631) | more than 8 years ago | (#15812643)

I understand it's customary not to RTFA before commenting. However for those amongst us, who do break that rule from time to time, the TFA is actually discussing that very issue in the paragraph "Traffic Mangling":

Once you've got the Wiley hacker attacking your honeypot, the last thing you want to do is let him attack the rest of your network from the honeypot, or worse, attack someone else's network. A good line of defense in this instance is traffic mangling.

Traffic mangling requires an inline box running software like Hogwash. ...

Re:What is Honeypot (0)

Anonymous Coward | more than 8 years ago | (#15813109)

You did not understand that traffic mangling is not the same as using a firewall.

Re:What is Honeypot (0)

Anonymous Coward | more than 8 years ago | (#15812512)

What is a Honeypot? Jesus, how low Slashdot has dropped, why it's almost Digg.

Re:What is Honeypot (2, Funny)

masterzora (871343) | more than 8 years ago | (#15813062)

The difference is that here he's just karma whoring whereas on Digg they would genuinely need such an explanation.

Re:What is Honeypot (0)

Anonymous Coward | more than 8 years ago | (#15813443)

Yeah - I mean "interesting things to do with your honeypot" . . . I only opened this article because I thought it was porn.

Re:What is Honeypot (1)

donaggie03 (769758) | more than 8 years ago | (#15813428)

Why mark this redundant? I didn't know what a honeypot was . . To be fair, I was kinda getting the idea from the context of the other posts, but the definition still helps.

Nice... (2, Interesting)

Anonymous Coward | more than 8 years ago | (#15812332)

Nice article.



What with the rumours that Mckinnon was caught by a US Military Honeypot it's interesting to read what can be done with sych systems.

Nice Agenda (0)

Anonymous Coward | more than 8 years ago | (#15812574)

What rumours? Are you actually even interested in honeypots? A look at your post suggests your primary interest is in McKinnon.

Re:Nice Agenda (0, Troll)

gd23ka (324741) | more than 8 years ago | (#15812939)

Go away back to Wikipedia where that kind of bullshit belongs.

And a fun way to get free warze. (5, Interesting)

LWATCDR (28044) | more than 8 years ago | (#15812407)

Just put on unpatched Win 98 box naked on the Internet and a wait. You will soon have a hard drive full of porn and warze.

Actually it sounds like fun. Throw up VMWare and a few images and you could make an enter virtual network for a hacker to go nuts over.
Add in a PDP-11 Emulator, some hacked NASA and Air Force sites, a fake database or two, some Word documents showing that the US has a secert base in the middle of the everglades.....
could be fun.
Sounds like a great Hacker DnD game. Get a bunch of people to set up these things and the game is too find out what the is going on. :)

Re:And a fun way to get free warze. (1, Funny)

quonsar (61695) | more than 8 years ago | (#15812475)

Thou shall not use an programming language that works on only one OS.

Thou shall not program computers in any language until having mastered the one you speak and write in.

Idiot (0, Offtopic)

Frosty Piss (770223) | more than 8 years ago | (#15812536)

Do you have so much time on your hands that you find it amusing to prattle on about common spelling errors? Or does it some how make you feel superior to spot a misused "an" and point it out to the whole world as is "see, this person is an idiot, whereas I am a superior human!". Good lord, get a life.

Re:Idiot (3, Funny)

Anonymous Coward | more than 8 years ago | (#15812808)

Do you have so much time on your hands that you find it amusing to prattle on about common spelling errors? Or does it some how make you feel superior to spot a misused "an" and point it out to the whole world as is "see, this person is an idiot, whereas I am a superior human!". Good lord, get a life.

Errors:
1. "Somehow" is one word.
2. as is "see, this person is an idiot As is?
3. a superior human!". With the type of English that one uses in the U.S., sentence-ending punctuation is usually contained within the quotation marks and one doesn't usually use two of them in one sentence.
4. Good lord Generally, "Lord"--when used in this context--is capitalized.

Damn, it's great to have so much time on my hands so I can feel so superior!

Re:Idiot (0)

Anonymous Coward | more than 8 years ago | (#15813408)

Damn, it's great to have so much time on my hands so I can feel so superior!


feel, being the operative word.

Re:Idiot (0)

Anonymous Coward | more than 8 years ago | (#15813763)

With the type of English that one uses in the U.S., sentence-ending punctuation is usually contained within the quotation marks and one doesn't usually use two of them in one sentence.

This is correct usage in English-as-one-has-been-taught-by-liberal-arts-maj ors, however it is incorrect in English-as-it-is-used-in-international-technical-c ommunications. Quotation marks enclose input or output string reproduced verbatim, without sentence-ending punctuation to avoid confusion ("ls /usr/bin" and "ls /usr/bin." return very different results). Guess which we use here on slashdot...

Re:Idiot (2, Insightful)

udderly (890305) | more than 8 years ago | (#15812826)

Dude (or Dudette), are you new here? Didn't you realize that correcting other people and then feeling superior is what /. is all about. Heck, it's one big "I'm smarter than you" pissing contest.

Re:Idiot (0)

Anonymous Coward | more than 8 years ago | (#15813507)

"Waa! Waa! Waa! I can't write English so I'm going to attack those who point out my mistakes instead of improving myself."

Stop whining and read a grammar book instead. Who the hell was stupid enough to mod you as "Insightful", another former D- student?

Re:Idiot (0)

Anonymous Coward | more than 8 years ago | (#15813559)

I can't write English so I'm going to attack...

You missed a comma; that should be, "I can't write English, so I'm going to attack..."

Re:And a fun way to get free warze. (1)

LWATCDR (28044) | more than 8 years ago | (#15812562)

Thanks I missed that typo.

Re:And a fun way to get free warze. (1)

dugjohnson (920519) | more than 8 years ago | (#15812736)

I'm just curious as the the grammatical rule that makes it "an programming language". I thought you use "an" when the following word begins with a vowel or a silent "h" as in "an hour". Could you point me to the rule that makes "an programming language" preferable to "a programming language".

Re:And a fun way to get free warze. (1)

x2A (858210) | more than 8 years ago | (#15812975)

You do, which is why the poster has corrected their sig to say 'a' instead of 'an'. You (as I) didn't see the reply pointing out the 'an' until it was fixed, making it look as if the reply suggested using 'an' instead of 'a', but a lil extra thought makes it obvious that it was the other way round.

Re:And a fun way to get free warze. (4, Insightful)

Joe U (443617) | more than 8 years ago | (#15812894)

And if he corrects it to read:

"Thou shall not use any programming language that works on only one OS. "

Then it's a typographical error, most likely a soft-broken 'Y' key, and the joke falls apart. Making fun of someone with a broken keyboard is just mean. He might be on his way to CompUSA right now for all you know.

Now, if he corrects it to read:

"Thou shall not use a programming language that works on only one OS. "

Then it's grammatical, and the joke will hold up. The world will be safe from poor grammar. You will have fulfilled your destiny. Crush the lesser races, conquer the galaxy, unimaginable power, unlimited rice pudding...Etcetera, etcetera...

(or not)

Re:And a fun way to get free warze. (0)

Anonymous Coward | more than 8 years ago | (#15812996)

You should be more tolerant. Perhaps English is not his native language? How can he improve if he's not allowed to write...

Re:And a fun way to get free warze. (1)

donaggie03 (769758) | more than 8 years ago | (#15813451)

Psh ... duh ... How can he improve if we aren't here to relentlessly torment him on his mistakes?

Re:And a fun way to get free warze. (1)

solid_liq (720160) | more than 8 years ago | (#15813235)

Thou shall not program computers in any language until having mastered the one you speak and write in.

I take this to mean you do not program computers in any language? After all, you have not mastered English either. You left a dangling preposition. The correct way to phrase this is:

Thou shalt not program computers in any language until having mastered the one in which you speak and write.

;)

Re:And a fun way to get free warze. (4, Funny)

NormalVisual (565491) | more than 8 years ago | (#15814560)

That reminds me of a joke I heard years ago:

A new Harvard freshman was lost and looking for the library. He approached what obviously was an upperclassman, and asked "Excuse me, could you please tell me where the library is at?" The upperclassman looked down his nose at the freshman, and replied, "My good sir, here at Harvard we do *not* end our sentences with a preposition." The freshman is a bit taken aback, and rephrases his question: "Okay, could you please tell me where the library is at, asshole?"

There aren't too many grammar jokes out there, so I guess you have to take them as you can get them.

Re:And a fun way to get free warze. (1)

elyons (934748) | more than 8 years ago | (#15814146)

//Thou shall not use an programming language that works on only one OS. /Thou shall not program computers in any language until having mastered the one you speak and write in. . . .having mastered the one in whichyou speak and write.

Re:And a fun way to get free warze. (3, Interesting)

tfried (911873) | more than 8 years ago | (#15812634)

A place, I once worked at, had a dozen or so entirely unpatched Win98 boxes connected directly to the net - for years. And guess what? Of course I wouldn't have trusted those boxes one inch, but I've never heard of any hacking troubles with those boxes, either (ok, neither IE nor Outlook were used on those computers, but other than that, no protection at all).

Yes, Win98 may be seriously vulnerable in hundreds of ways (even though it has hardly any networking functionality), but it just isn't targetted nowadays, in my experience. Try the same thing with WinXP, and you're compromised in less than a minute.

Re:And a fun way to get free warze. (3, Insightful)

Clovert Agent (87154) | more than 8 years ago | (#15812830)

A place, I once worked at, had a dozen or so entirely unpatched Win98 boxes connected directly to the net - for years.

I seriously doubt it - not if you mean "in the last several years". Any unprotected box hanging directly off the net will be scanned and fingerprinted within minutes if not seconds of connecting, and exploited automatically. Botnets aren't kiddies' toys anymore: they're very professionally run and your unpatched '98 box is just grist for the mill.

About five years ago I timed scans off a dialup connection in, let's say, a hostile part of the world - average of around 20 seconds from connect to scan. It hasn't gotten any better since.

Re:And a fun way to get free warze. (2, Interesting)

GC (19160) | more than 8 years ago | (#15813351)

That is a load of crap, though I admit it will probably depend on your IP range.

I routinely check a few Class-Cs and it takes around 5 minutes for a scan to appear on our firewall logs. Mostly 1433 port these days, which Win98 will quite hapilly drop.

After about 30 minutes I *might* get a port 139 scan, which many Win98 installations will *still* drop.

Cut the crap and the Microsoft bashing, I'm much more concerned about the spate of port 22 scans, and the brute force ssh password attacks going on right now.

Re:And a fun way to get free warze. (2, Interesting)

Cid Highwind (9258) | more than 8 years ago | (#15813690)

Cut the crap and the Microsoft bashing, I'm much more concerned about the spate of port 22 scans, and the brute force ssh password attacks going on right now.


Fail2ban [sourceforge.net] is your friend. Throttle those ssh botnets down to a few login attempts per hour and eventually the operator will go after a less secure target.

Shameless plug (1)

LordSnooty (853791) | more than 8 years ago | (#15813711)

http://www.csc.liv.ac.uk/~greg/sshdfilter/ [liv.ac.uk]

Get this and your ssh brute force attack worries will be over. They're only popular because ssh tends not to block repeated attempts by default, and many other avenues have been closed to the crackers. So make sure you block this particular route.

That was my experience in late-90s as well (4, Interesting)

billstewart (78916) | more than 8 years ago | (#15813521)

I used to have a lab with a DSL like and a couple of quasi-honeypot machines on it. The Win95 (or was it Win98?) machine was never bothered; the RedHat 6 machine kept getting brutally attacked every week so after a few rebuilds I named it "kenny". Now, the Windows machine was partly not bothered because it wasn't doing anything interesting enough to be very vulnerable - there wasn't a web or FTP server, it wasn't sharing any disks or printers, I usually used Netscape browsers instead of IE, and if you did break in all you'd get for your trouble was a Windows machine. I had another Linux box on the network that was always running a scrolling tcpdump (AFAIK nobody ever bothered it - I had fewer services installed on it because it only had 500MB disk), and could see a variety of interesting traffic.
  • One week I saw it sending lots of pings to a university in Sweden. I checked with the admin there, who said it looked like my machine had been infected with Stacheldraht DDOS client and was reporting back to an infected machine at his site, and told me how to clean it up.
  • Another week the pings were to Washington University in St. Louis. I forget whether their machine had attacked mine or mine had attacked theirs, but either way it seemed appropriate since they'd probably used wuftpd to break in to my machine. Cleaned it up again.
  • Another week I did a "find" looking for something under root's home directory, and found a whole ~/.something directory I didn't recognize. I did an "ls", which couldn't find that directory - they'd replaced /bin/ls, but forgot to update the date stamp on the file, and also forgot to update the date stamp on /bin/ps. "ps" was hacked to not report the processes they were running from their hidden ~/.whatever directory - but "ls" wasn't hacked to hide things in /proc :-). So I cleaned up their semi-clever little rootkit.
  • After I cleaned up one of the latter two attacks, their next act was an "rm -rf /" on poor Kenny. Stupid thugs; at least they could have tried something interesting.

Re:And a fun way to get free warze. (2, Interesting)

winkydink (650484) | more than 8 years ago | (#15812676)

Actually, a lot of malware is already vmware-aware and avoids hosts running windows under vmware. More and more getting this functionality every day.

Re:And a fun way to get free warze. (1)

kasperd (592156) | more than 8 years ago | (#15812776)

Actually, a lot of malware is already vmware-aware and avoids hosts running windows under vmware.
If they can tell the difference, it means the emulation is not as good as it could be. In that case you probably should look for a better emulator.

Re:And a fun way to get free warze. (0)

Anonymous Coward | more than 8 years ago | (#15812903)

Oh no, the emulation works great. They tell by looking at the name of the display driver. Either it's a special one provided by vmware to optimize the performance, or it's one for some ancient framebuffer-based hardware that noone sane uses anymore. Duh.

Cheers, Kuba

Re:And a fun way to get free warze. (1)

Magic5Ball (188725) | more than 8 years ago | (#15812951)

If they can tell the difference, it means the emulation is not as good as it could be.

No, the emulation is better than good if leaving signs like VM video card strings in place keeps the script kiddies away.

Re:And a fun way to get free warze. (2, Insightful)

x2A (858210) | more than 8 years ago | (#15813012)

No, the emulation's fine, vmware was never designed to be undetectable, instead it was designed to provide a stable host-machine-hardware-independant machine... ie, if I installed Windows (known for not coping with motherboard/chipset changes well at all) in vmware on one machine, and move the virtual machine to another completely different set up machine, it will still run with no problems and no driver changes required. This is one of the things that makes vmware such a great tool.

This means that you can detect that specific hardware configuration and tell that it's vmware.

Re:And a fun way to get free warze. (1)

OverflowingBitBucket (464177) | more than 8 years ago | (#15814166)

If your aim is to hide the fact you are running on a virtual machine, you are quite correct. VMware may not be the best choice.

But calling for a "better emulator" because you are using a tool for a purpose outside of the one it was designed for is a bit rude. It's a bit like asking for a better spreadsheet than Excel because you are having trouble writing a book with it. Not quite the right tool for the job.

VMware does a nice job of hosting a guest operating system inside another. They don't try to hide the fact it is a virtual machine at all (check driver names, certain memory ranges, disk serials, presence of VMware tools, etc). I'd rather have the option of running at a decent speed without being burdened by the virtual machine going to great lengths to hide itself from the guest.

Having said that, having an optional toggle to turn on machine-hiding features would be really, really nice, and no doubt make the tool much more useful for hosting honeypot systems.

Re:And a fun way to get free warze. (1)

TheLink (130905) | more than 8 years ago | (#15814459)

Well if malware refuses to run on vmware guests, then that's good for me - because I run a fair number of servers as vmware guests, including my firewall.

BTW: is it copyright infringement if you redistribute a hacker's tools without his permission? Could the hacker use the DMCA as well?

Just one problem - (3, Insightful)

njdj (458173) | more than 8 years ago | (#15812877)

a fake database or two, some Word documents showing that the US has a secert base in the middle of the everglades....

You'll then get pulled in by Homeland Security and shipped to Gitmo for revealing that the US has a secret base in the middle of the Everglades.

Re:And a fun way to get free warze. (4, Informative)

Anonymous Coward | more than 8 years ago | (#15812946)

I'm surprised a /.'er would recommend VMware, with XEN the clear winner in the honeypot niche. Just check out The Potemkin Honeyfarm [honeyblog.org] for more info... These guys are actually able to deploy an image is less than a second and do all sorts of whacky business to delude hackers into believing they're roaming the internet freely :-)

Yeah, like you'd trust *those* warez... (1)

billstewart (78916) | more than 8 years ago | (#15813617)

Sure, there are worse places to get warez, but the type of people who crack into a site to get a place to store warez are _not_ the types of sources you'd want to trust.

Fun things such as... (0)

Anonymous Coward | more than 8 years ago | (#15812417)

...watch the cracker do god knows what and then get hassled by the feds?

/mod Up (-1, Redundant)

Anonymous Coward | more than 8 years ago | (#15812457)

[slashdOt.org], Fun to be again.x fatal mistakes,

NASA (3, Funny)

wootest (694923) | more than 8 years ago | (#15812510)

Host NASA servers [slashdot.org] ? :)

I'm disappointed... (-1)

creimer (824291) | more than 8 years ago | (#15812513)

This article has nothing about babes and bees. Everyone knows that babes just love fresh honey.

Honey can lead to infant botulism (5, Funny)

itismike (582070) | more than 8 years ago | (#15812720)

Sorry to do this, but I think that it is somewhat careless to assume that all new parents that might be reading Slashdot are in fact aware of the unique danger that honey presents to infants. Just in case someone comes across this and isn't aware, please look into the concerns related to infant botulism [google.com] before getting the bright idea to feed your newborn some honey. Now go ahead and make the jokes - I just think that this needed to be said.

Re:Honey can lead to infant botulism (-1, Flamebait)

rivetgeek (977479) | more than 8 years ago | (#15812758)

Now where did I leave my STFU stick? Are you honestly this retarded that you have to glibbly spout of random trivia that in no way relates to the topic at hand? If people are discussing the middle east cocflict, do you suddenly feel a need to warn them that Iraq has camel spiders and those are bad for babies?

Re:Honey can lead to infant botulism (0)

Anonymous Coward | more than 8 years ago | (#15812843)

I think your joke-o-meter is miscalibrated... either that, or mine is.

Re:Honey can lead to infant botulism (1)

rylin (688457) | more than 8 years ago | (#15812876)

Well, camel spiders ARE bad for babies!

Re:Honey can lead to infant botulism (1)

Guru2Newbie (536637) | more than 8 years ago | (#15812952)

But camel spiders dipped in honey are delicious!

Re:Honey can lead to infant botulism (1)

itismike (582070) | more than 8 years ago | (#15813030)

You must be new here. Please click Parent to see the relivance.

Re:Honey can lead to infant botulism (1)

rivetgeek (977479) | more than 8 years ago | (#15813118)

....Im guessing you might be new EVERYWHERE. My point still stands, the article, thread, and conversation has nothing to do with giving honey to children. Please exit the high horse ride to your left.

Re:Honey can lead to infant botulism (0)

Anonymous Coward | more than 8 years ago | (#15813375)

the article, thread, and conversation has nothing to do with giving honey to children.

Yes, that was the point of the joke, which are are stubbornly refusing to get even when beat over the head with it. The comment "This article has nothing about babes and bees. Everyone knows that babes just love fresh honey." prompted the poster to "misinterpret" talking about babes as babies and to post his "helpful" tip. Get it now?

Re:Honey can lead to infant botulism (0)

Anonymous Coward | more than 8 years ago | (#15813335)

wont somebody PLEEEEZ think of the children!

Re:Honey can lead to infant botulism (1)

neiltrodden (981196) | more than 8 years ago | (#15812811)

I'm only replying to this post so that I can validate that, a: it is real, and b: I am NOT hallucinating.

Re:Honey can lead to infant botulism (0)

Anonymous Coward | more than 8 years ago | (#15812994)

And you have done neither, since you might be having a hallucination that your post has both appeared and generated this response.

Re:Honey can lead to infant botulism (1)

JYavner (614820) | more than 8 years ago | (#15813302)

The probability is about 15 million to 1 against a baby being harmed by honey. If you really care, why don't you avoid putting the baby in a car seat (200,000 to 1 chance of death every time Baby goes for a ride)?

The "no honey for babies" thing makes as much sense as the "no aspirin for children" thing. Some kid died from an ultra-rare syndrome and the parents decided to make the death "meaningful" by going on a crusade against a usually-harmless substance. Breast milk is much better than honey, anyway.

Re:Honey can lead to infant botulism (1)

Jeremi (14640) | more than 8 years ago | (#15814163)

Breast milk is much better than honey, anyway


True, but I'll be damned if I can find a place that will sell it to me. For now I guess I'll just stick with soda.

a fake shell (4, Funny)

Per Wigren (5315) | more than 8 years ago | (#15812558)

Something funnier (IMHO) would be to write a simple wrapper over the shell which gives crazy error messages and other things:
root@honeypot:~# whoami
I have no idea.
root@honeypot:~# ls
PRESS PLAY ON TAPE
root@honeypot:~#
and so on... :)

Re:a fake shell (2, Funny)

TheRaven64 (641858) | more than 8 years ago | (#15812809)

On a network I used to admin, I added a companion of the well known 'whoami' command; a 'whereami' command, which always replied 'You're in the village.'

Re:a fake shell (1)

joper90 (669321) | more than 8 years ago | (#15812831)

That is hardcore..

Re:a fake shell (1)

complete loony (663508) | more than 8 years ago | (#15814561)

You're in a maze of twisty passages all alike. You are likely to be eaten by a grue.

Re:a fake shell (1)

east coast (590680) | more than 8 years ago | (#15813493)

What's so funny about "PRESS PLAY ON TAPE"? Oh, I see... you think you're all fancy with all your "floppy drives" and "hard drives" now don't ya?

Most people.. (5, Funny)

dubbreak (623656) | more than 8 years ago | (#15812561)

Most people use their honey pots for surfing the web, checking email and sometimes playing games.

Heh. (2, Interesting)

Renraku (518261) | more than 8 years ago | (#15812636)

Give them a virus that you wrote. Put a bunch of what appear to be self-extracting zip files in a directory and attach a virus to the extractor. Give them fun names, too. Like Montauk Project, Philadelphia Experiment, Roswell, etc.

Re:Heh. (1)

Lehk228 (705449) | more than 8 years ago | (#15813354)

what makes you think they would run your SFX zip files? AFAIK every archive app can unpack SFX files as well as regular compressed files

Re:Heh. (2, Interesting)

Jeremi (14640) | more than 8 years ago | (#15814131)

Give them a virus that you wrote.


On that note, has anyone done any security audits of the popular remote-exploit tools? It would be fun to write a "special" version of wu-ftpd 1.0 (or whatever) that recognizes when a particular tool is trying to exploit it, and responds by taking advantage of a bug in that tool to give you a root shell on the attacker's machine.... ;^)

Risk to others (5, Insightful)

Anonymous Coward | more than 8 years ago | (#15812649)

What if someone uses the trojans, etc. they install on your honeypot to launch an attack on some other site? Since your express purpose is to watch what they do, you can't claim ignorance.

Are you liable for any damages?
Are you causing problems for law enforcement or other sysadmins by helping the attacker obscure their identity?

Seems like you would need to filter outbound traffic VERY carefully. It would be almost impossible to do this without the attacker knowing -- they'd realize it was a honeypot and get the hell out of there.

Re:Risk to others (1)

Shadowruni (929010) | more than 8 years ago | (#15813067)

RTFA dude, he addressed that. The risk associated with that would be somewhat lower since you already KNOW you're a target. Not like when you're oblivious to an attack. Once again... don't reply to this UNTIL you've RTFA.

Re:Risk to others (0)

Anonymous Coward | more than 8 years ago | (#15813180)

I sure did RTA:

"It's impossible to stop all outgoing exploits with manglers, but it can give you peace of mind that the outside world is relatively protected from your compromised honeypot [...]"

Very reassuring.

And what about all the morons who read an article like that and think it would be fun to set up a honeypot, but don't bother with all the hard, boring, work of isolating it?

Re:Risk to others (1)

Jeremi (14640) | more than 8 years ago | (#15814148)

What if someone uses the trojans, etc. they install on your honeypot to launch an attack on some other site?


I'd say that a proper honeypot would simulate the other site as well. Once you've taken the blue pill, there's no escape... ;^)

A swarm (0)

Anonymous Coward | more than 8 years ago | (#15812783)

Drive around randomly blasting a half dozen points with the MAC addresses starting with 00008F (Rayethon Systems and the fine maker of these [designation-systems.net] ). Unfortunaly those in the Middle East would be the only ones to get the joke.

pr0n (3, Funny)

Khashishi (775369) | more than 8 years ago | (#15813046)

Just fill the honeypot with pr0n and there will be plenty for the hacker to play with.

no longer honeypot (1)

bobamu (943639) | more than 8 years ago | (#15813048)

now a honey cluster

or a hive?

this has endless potential

I feel a little ashamed now

Honeypot considerations (2, Informative)

Dryanta (978861) | more than 8 years ago | (#15813154)

Make sure that everything rlogs to an append-only hardened blackbox with a high securelevel. Preferably obsd. Also, make sure you have banners that will hold up in court. A honeypot is not something to be viewed as 'extra work' for a network administrator, but ESSENTIAL when combined with a few IDS sensors. It is the way to keep on top of your overall network security, and gives you a few extra IP blocks to add to your overall firewall ruleset. If you are really lucky, you will bring down some asshat that tries to compromise the network you have spent all those hours configuring and hardening.

Fun things to put on honeypots (4, Funny)

Animats (122034) | more than 8 years ago | (#15813200)

  • Call up a venture capitalist friend and ask for some rejected business plans for really stupid business ideas. Put them on your honeypot.
  • Get some publicly available geophysical data for real oil wells, and change all the locations to somewhere else with comparable geology but no oil.
  • Get some rejected porno images from people in the industry. Buy the reproduction rights. Put Digimarc watermarks on them. Wait for them to reappear elsewhere. Sue. Profit.

Bad advice (2, Insightful)

frovingslosh (582462) | more than 8 years ago | (#15813204)

from the aericle:

Simulated traffic can be used in conjunction with simulated targets....If you want to really see what the attacker is all about, simulate traffic that looks like someone trading MP3s, or traffic that looks like someone transferring business documents. If the attacker spends most of his time looking at the MP3 traffic, he is probably pretty harmless. If he spends his time looking at the documents, he is probably pretty dangerous.

Yea, right. Great advice, right up to the day that the RIAA and their FBI thugs come breaking down your door and taking every computer that you own and anything else they want too, because the hacker that broke into your system and saw all that traffice was an RIAA hacker.

Re:Bad advice (1)

frostoftheblack (955294) | more than 8 years ago | (#15813565)

The key word there was simulate. I'm sure if you really had the time to devise a system like that, you'd find legal mp3z and faked or otherwise declassified business documents. Ha.

Re:Bad advice (0)

Anonymous Coward | more than 8 years ago | (#15814156)

So they would use evidence they gained whilst illegally hacking into your honeypot?

Not to mention it is only simulated traffic, so you aren't really distributing the files, so they don't have a case anyway.

Consider how this one looks to a visiting non-Geek (4, Funny)

umbrellasd (876984) | more than 8 years ago | (#15813293)

"Fun Things To Do With Your Honeypot System"

non-Geek: "Is this a sexual reference? I don't get it...are they talking about that weird cyber thing?"

"From The Article" (2, Insightful)

jonabbey (2498) | more than 8 years ago | (#15813314)

Zonk, is it necessary to edit down what your submitters give you and take half of the post to include part of the referenced article?

Tis a pity ... (1)

Infernal Device (865066) | more than 8 years ago | (#15813802)

Too bad you can't trace the hackers back to the source and order a hit squad on them ... well, maybe in Russia.

It's all fun and games... (4, Insightful)

JustJake (130239) | more than 8 years ago | (#15814168)

until someone uses your honeypot as a platform to attack someone else. Or were you thinking that bad guys never use machines under their control in this manner?

Who are these security people with so much free time that they can monitor a honeynet for hours on end and create bogus traffic to move across it in order to entertain a bored 16-year-old hacker from who knows where? Every serious professional I know is up to his eyeballs in real work.

Re:It's all fun and games... (0)

Anonymous Coward | more than 8 years ago | (#15814752)

It's been said before, it will be said again: simulated targets.

Obligatory (1)

Shadyman (939863) | more than 8 years ago | (#15814365)

In Soviet Russia, Honeypots hack YOU.
Load More Comments
Slashdot Login

Need an Account?

Forgot your password?

Submission Text Formatting Tips

We support a small subset of HTML, namely these tags:

  • b
  • i
  • p
  • br
  • a
  • ol
  • ul
  • li
  • dl
  • dt
  • dd
  • em
  • strong
  • tt
  • blockquote
  • div
  • quote
  • ecode

"ecode" can be used for code snippets, for example:

<ecode>    while(1) { do_something(); } </ecode>