WASC Distributed Web Honeypots Project Update

简介: As the WASC Distributed Web Honeypots Project Sponsor, we are excited to announce that we have...

As the WASC Distributed Web Honeypots Project Sponsor, we are excited to announce that we have officially launched the next phase of the project!  If you would like to participate, please read below.

Project Overview

The goal of the Distributed Web Honeypot (DWH) Project is to identify emerging attacks against web applications and report them to the community.  This may include automated scanning activity, probes, as well as, targeted attacks against specific web sites or applications.  The scope of this project has recently been expanded to include deployment of both standard web application honeypots and/or open proxy honeypots.  Project participants may choose whether they want to run their honeypot as an open proxy or a stand-alone sensor.

Project Leader

If you would like to be involved with the project, please contact the project leader - Ryan Barnett (rbarnetttrustwave.com).

Why are you doing this?

Web attacks are increasing at an alarming rate. There are constant news stories of web application breaches; however there is normally not much technical information as to what vulnerabilities were exploited.  See the WASC Web Hacking Incident Database (WHID) for data.  Without knowing how the attackers were able to compromise the web site, we do not know how to protect our web applications.  This is one of the main goals of this project - to provide technical details about web-based attack vectors.  This project aims to answer the following types of questions:

  • What web applications are the bad guys targeting?
  • Are they using new tools or techniques?
  • Is there a new worm out on the web that is mass rooting websites?

How did you configure this web honeypot?

The new WASC web honeypot architecture is setup with the following:

  1. ModSecurity web application firewall engine.
  2. OWASP ModSecurity Core Rule Set (CRS).
  3. Centralized logging of the ModSecurity audit_log data with the mlogc program along with the Trustwave SIEM and the ModSecurity Audit Console.

Screen shot 2012-02-08 at 2.55.23 PM


Are there any legal issues I should be concerned with?

The short answer is yes - if you choose to run your honeypot as an open proxy server. There are some legal issues to be aware of in this type of honeypot setup where we will be capturing third party user information.  The Honeynet Project has excellent information on the challenges and issues surrounding due diligence in deploying honeypots/honeynets. Refer to this paper on Honeynets. In their book Know Your Enemy they have an entire chapter dedicated to Legal Issues.  It is this concern over increased risk why we expanded the project scope to allow for deployment of stand alone web sites instead of running it as an open proxy.

Should I run this on my production environment?

That depends on your risk tolerance and whether or not you want to run the honeypot as an open proxy.  If your organization is willing to approve it, then the program itself is a virtual host and will run under any host that runs VMware.  We have many varied organizations participating ranging from universities, ISPs and government networks.

Can I run the sensor at home?

Sure, many participants are running the sensors from their home network.  You shoud, however, consult your ISP's AUP info before deploying any web servers.  There may be conflicts with your ISP allowing inbound HTTP traffic however the honeypots are pre-configured to listen on common proxy ports including 8000, 8080 and 3128.

Should I announce the honeypot IP address on public lists?

That is up to you however be aware that if the sensor IP address becomes posted to pubic open proxy lists that more than likely your sensor will become flooded with SPAMMER traffic.

What prerequisites do I need to participate?

An understanding of ModSecurity functionality will help to understand the rules and logs being generated.  Review the following:

How to Participate

There are two ways to participate:

  1. Deploy a honeypot sensor

You can participate by deploying the WASC Web Honyepot sensor on your own network. WASC has created a VMware image of the standard sensor. This image includes all of the software to quickly get your sensor up and running with little configuration on the end user's part. You must contact the project leader via email in order to participate. You will then recieve the link location to download the VMware image.  You will need to have the free version of VMware player or Server.  If you would like to deploy a honeypot sensor, include the following details in your email to the project leader:

  • Sensor Point of Contact (POC) name
  • Source IP address that the logs will be coming from
  • Geographic location (Country, State, Locality)
  • Network Block Owner

The Project Leader will send back an email with instructions for downloading the VMware honeypot image data and the OS root credentials. The VMware host is configured with dhcp, so after you login, verify that the host has successfully obtained an IP address. The Project Leader will also provide you with the ModSecurity log agent credentials you will need to authenticate when sending your log data. ModSecurity uses a C program called mlogc located in the /usr/local/apache/conf/ directory. This program will take the data generated by the ModSecurity concurrent audit log and uses HTTP PUT requests to upload the individual audit_log files to the central console host. Each WASC honeypot sensor will have a unique username/password combination. The file that you will need to update is /opt/wasc-honeypot/etc/mlogc.conf.  The final step is to start up the apache web server - /etc/init.d/wasc-honeypot-ctl.sh start. You should then review the log files to ensure that they everything is working properly.

  1. Data analysis

Even if you do not deploy a honeypot sensor, we need help with data analysis for the capture traffic.  We will provide access to the ModSecurity AuditConsole web interface to all project participants.  The AuditConsole has built in searching and reporting functions that may be used for batch analysis.  We will provide all project participants with a reporting procedure so that we have a consistent process for vetting data prior to releasing to the public.

目录
相关文章
|
10月前
|
Java Maven
Maven打包出现webxml attribute is required (or pre-existing WEB-INF/web.xml if executing in update mode)
Maven打包出现webxml attribute is required (or pre-existing WEB-INF/web.xml if executing in update mode)
307 0
|
Web App开发 Shell Linux
|
Web App开发 Java Apache
【maven 报错】maven项目执行maven install时报错Error assembling WAR: webxml attribute is required (or pre-existing WEB-INF/web.xml if executing in update mode)
在使用maven新建的web项目中,执行   执行如上的这两个操作,报错: 1 [ERROR] Failed to execute goal org.apache.maven.plugins:maven-compiler-plugin:2.
3378 0
|
Web App开发 Java
Sun Java Web Server version 7.0 update 7 remote stack overflow exploit
/* Sun Java Web Server Exploit * Tested on: * Sun Java Web Server 7.
808 0
|
安全 .NET 开发框架
.NET Framework 2.0 SYSTEM.WEB.DLL Security Update
Microsoft released .NET Framework 2.0 SYSTEM.WEB.DLL Security Update because of security issue has ...
776 0
|
19天前
|
监控 JavaScript 前端开发
《理解 WebSocket:Java Web 开发的实时通信技术》
【4月更文挑战第4天】WebSocket是Java Web实时通信的关键技术,提供双向持久连接,实现低延迟、高效率的实时交互。适用于聊天应用、在线游戏、数据监控和即时通知。开发涉及服务器端实现、客户端连接及数据协议定义,注意安全、错误处理、性能和兼容性。随着实时应用需求增加,WebSocket在Java Web开发中的地位将更加重要。
|
30天前
|
Web App开发 前端开发 开发工具
介绍Web开发的基础知识
介绍Web开发的基础知识
29 7
|
5天前
|
JSON Java fastjson
Spring Boot 底层级探索系列 04 - Web 开发(2)
Spring Boot 底层级探索系列 04 - Web 开发(2)
15 0
|
5天前
|
安全 编译器 PHP
PHP 8.1版本发布:引领Web开发新潮流
PHP编程语言一直是Web开发的主力军,而最新发布的PHP 8.1版本则为开发者们带来了更多创新和便利。本文将介绍PHP 8.1版本的主要特性,包括更快的性能、新的语言功能和增强的安全性,以及如何利用这些功能来提升Web应用程序的质量和效率。