39
© 2007 The MITRE Corporation. All rights reser OWASP Conference 06 Sep 2007 Informatio n Assurance Using Honeyclients for Detection and Response Against New Attacks Kathy Wang MITRE Corporation [email protected]

© 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

Embed Size (px)

Citation preview

Page 1: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

© 2007 The MITRE Corporation. All rights reserved

OWASP Conference06 Sep 2007

InformationAssurance

Using Honeyclients for Detection and Response Against New AttacksKathy Wang

MITRE Corporation

[email protected]

Page 2: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

2© 2007 The MITRE Corporation. All rights reserved

Problem

Client-side exploits are a growing threat– Lots of client-side vulnerabilities

Microsoft Internet Explorer has more than 50 serious vulnerabilities in last 6 months (SecurityFocus database)

– Lots of client-side exploits 90% of all PCs harbor spyware (Webroot, 2006)

We need to be able to proactively detect and characterize client-side attacks before we get hit

We lack a proactive detection technology for client-side attacks

Page 3: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

3© 2007 The MITRE Corporation. All rights reserved

Example of an Emerging Threat

Contagion worm-like attacks– Paxson, et al, How to 0wn the Internet in Your Spare Time– Wheel-and-spoke client-server infection model– Requires two exploits, one for client, one for server

VulnerableClient

Contagion WormLoaded Server

VulnerableServer

VulnerableServer

VulnerableServer

Infected

Infected Infected Infected

Page 4: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

4© 2007 The MITRE Corporation. All rights reserved

Contagion Worm Model Assumptions

Assume:– 1M vulnerable clients in the world

– 1M vulnerable web servers in the world Out of 10M web servers

– 1K popular servers

– Clients surf one server per minute

– Clients have 90% chance of visiting popular server, 10% chance of visiting unpopular server

– Contagion worm begins on one unpopular server

Page 5: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

5© 2007 The MITRE Corporation. All rights reserved

Possible Contagion Worm Propagation

Contagion Worm Propagation

0

20

40

60

80

100

1 11 21 31 41 51

Time Elapsed (mins)

% In

fecte

d

Vulnerable Web Clients

Popular Web Servers

Unpopular Web Servers

Page 6: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

6© 2007 The MITRE Corporation. All rights reserved

A New ‘Business’ Model

Page 7: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

7© 2007 The MITRE Corporation. All rights reserved

Another Business Model

Page 8: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

8© 2007 The MITRE Corporation. All rights reserved

Current Situation Current coverage of client-side exploits is inadequate

– Over 50% of recent vulnerabilities are client-based (SecurityFocus)– Only 1.5% of Snort Intrusion Detection System signatures are

based on client-side attacks (www.snort.org)

Honeypots– Detect server-side attacks– Passive devices

Current methods of client-side exploit detection are reactive– Anti-virus– Anti-spyware– Clueful users

Page 9: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

9© 2007 The MITRE Corporation. All rights reserved

Background - Honeyclients

Honeyclients provide capability to proactively detect client-side exploits– A honeyclient is a system that drives a client application to

potentially malicious servers– Any changes made on honeyclient system are unauthorized – no

false positives!– We detect exploits even without prior signatures

Page 10: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

10© 2007 The MITRE Corporation. All rights reserved

Basic Honeyclient Package

Client-side Exploit

Database

MaliciousServer

Request Response

Linux Host

Traffic logs

Windows VM

Honeyclient

Prototype Capabilities • Baseline integrity• Drive IE• Extract URLs• Recurse (Internal)• Integrity checks• Recurse (External)• Virtual host• Protective firewall• Exploit DB• Image rotation• Modular clients• Traffic history• Secure logging• Memory checks

Dedicated DSL

Internet

Page 11: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

11© 2007 The MITRE Corporation. All rights reserved

Current Situation

Attackers are starting to include honeyclient avoidance technologies on malicious servers– Repeated visits from identical IPs result in blocked access to

some malicious sites (SANS Internet Storm Center)– Detection of spidering from honeyclients led to redirection to

benign sites (Robert Danford)

Page 12: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

12© 2007 The MITRE Corporation. All rights reserved

Technical Approach: Add Advanced Capabilities to Counter Attackers Honeyclients should be able to:

– Detect kernel modifying rootkits Improve our integrity checks further Analyze virtual hard drives outside of VM environment

– Thwart exploits that detect virtual machine environments Add honeyclient capability for physical sandbox environment PXE boot image may allow us to network boot images quickly on real

hardware

– Handle active content sites Be able to access and download content from these sites Automated mouse clicking technology is available

– Be difficult to distinguish from human activity Attackers now recognize, and will actively counter honeyclients Develop human-like web crawling algorithms

Page 13: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

13© 2007 The MITRE Corporation. All rights reserved

Human-like Honeyclient Prototype

Link scoring (good vs

bad words, link location) Browsing order for

links (breadth vs

depth) Bandwidth footprint

(humans do not

access links at the

same speeds)

Page 14: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

14© 2007 The MITRE Corporation. All rights reserved

Current Situation

Each honeyclient can only cover so many sites– Need to coordinate efforts to improve coverage– No capability exists for distributed scanning

Individual honeyclients can scan redundant servers There is no central reporting mechanism

– The above restrictions limit the depth and breadth that we can effectively cover the Internet

Page 15: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

15© 2007 The MITRE Corporation. All rights reserved

Technical Approach: Increase Our Coverage of Servers Design and deploy distributed honeyclients

– Sponsors are asking for this in order to coordinate efforts– Berkeley Open Infrastructure for Network Computing (BOINC)

Project has framework for distributed computing– This will result in much better coverage of the servers on the

Internet

Page 16: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

16© 2007 The MITRE Corporation. All rights reserved

Distributed Honeyclient Prototype

Virtual Host

Honeyclient

Internet

Virtual Host

Report

Virtual Host

Honeyclient

Virtual Host

Honeyclient

CentralRepository

Honeyclient

Report

Report Report

= Bad server

= Good server

Page 17: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

17© 2007 The MITRE Corporation. All rights reserved

Technical Approach: Gather and Correlate Honeyclient Data Trend spotting of collected data and statistical correlation

– What percentage of all servers are malicious?– How do exploits spread from one server to another?– Are there clusters of servers that become malicious around the

same time? (i.e., can we infer the control structure of the malicious server community?)

Expand existing exploit database

Share results of correlation with community

Page 18: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

18© 2007 The MITRE Corporation. All rights reserved

Future Application for Honeyclients

Virtual Host

Honeyclient

Email Server

Email server sends email URLs and attachments to honeyclientfor processing

Honeyclient runs checks and notifies email server of bad URLs and/or attachments

Only emails that passchecks are forwardedto recipient

= Non-malicious email

= Malicious email

1 2

3

Using Honeyclients to Detect Malicious Emails

Page 19: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

19© 2007 The MITRE Corporation. All rights reserved

Impact and Technology Transition

We plan to pilot honeyclient technology for several sponsors

Industry plans to run honeyclients– Verizon

– Google

– Symantec

Products and standards– Contact vendors about new vulnerabilities in client applications

Page 20: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

20© 2007 The MITRE Corporation. All rights reserved

Why Should You Run Honeyclients?

Operational benefits

– Increase your visibility of emerging client-side threats

– Malware collection and analysis

– Share your results, and obtain other organizations’ results

Networking benefits

– Group forum meetings

– Government, industry, academic participation

– Discussion on latest trends in client-side exploits

Page 21: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

21© 2007 The MITRE Corporation. All rights reserved

Why Should You Run Honeyclients?

Cost benefits

– HoneyClient package and Linux OSes are open-sourced

– VMWare Server is free

– Your costs: hardware, Internet connection, Windows license, analysts

Other factors to consider

– Your private data will not be leaked

– Opportunity to provide public service through data sharing

Page 22: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

22© 2007 The MITRE Corporation. All rights reserved

Demonstration

Page 23: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

23© 2007 The MITRE Corporation. All rights reserved

Some Honeyclient Case Examples

Please DO NOT go to any of the sites on the following slides unless you REALLY know what you’re doing!!!)

<Disclaimer>

</Disclaimer>

Page 24: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

24© 2007 The MITRE Corporation. All rights reserved

www.world0fwarcraft.net (Changes)

Suspicious file

Page 25: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

25© 2007 The MITRE Corporation. All rights reserved

www.world0fwarcraft.net (Changes)

Where’s /etc/hosts file???Definitely suspicious

Page 26: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

26© 2007 The MITRE Corporation. All rights reserved

www.world0fwarcraft.net (Scans)

Page 27: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

27© 2007 The MITRE Corporation. All rights reserved

www.sharky.in (Changes)

Suspicious behavior, let’scheck it out further!

Page 28: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

28© 2007 The MITRE Corporation. All rights reserved

www.sharky.in (Changes)

This definitely doesn’tlook good…

Page 29: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

29© 2007 The MITRE Corporation. All rights reserved

www.sharky.in (Scan)

Poor resultson scans…

Page 30: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

30© 2007 The MITRE Corporation. All rights reserved

www.exploitoff.net (Changes)

OK. Let’s checkthis out.

Page 31: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

31© 2007 The MITRE Corporation. All rights reserved

www.exploitoff.net (Changes)

Definitely not normal…

Page 32: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

32© 2007 The MITRE Corporation. All rights reserved

www.exploitoff.net (Changes)

More badness…

Page 33: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

33© 2007 The MITRE Corporation. All rights reserved

www.exploitoff.net (Scans)

Note that this binaryis very poorly identified…

Page 34: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

34© 2007 The MITRE Corporation. All rights reserved

www.haaretz.com (Changes)

So many bad sites, so little time…

Page 35: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

35© 2007 The MITRE Corporation. All rights reserved

www.haaretz.com (Changes)

What is this’46W9GLCI.htm’file anyway???

Trying to adda printer???

Page 36: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

36© 2007 The MITRE Corporation. All rights reserved

www.haaretz.com (Changes)

Here it is again…

Page 37: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

37© 2007 The MITRE Corporation. All rights reserved

www.haaretz.com

Clearly, a hacker witha political agenda!

Page 38: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

38© 2007 The MITRE Corporation. All rights reserved

ns1.hosting101.biz

Yikes!Very, very bad sign…

Page 39: © 2007 The MITRE Corporation. All rights reserved OWASP Conference 06 Sep 2007 Information Assurance Using Honeyclients for Detection and Response Against

39© 2007 The MITRE Corporation. All rights reserved

Additional Project Information

Our project websitehttp://honeyclient.mitre.org

Send us email, and we will add you to the mailing [email protected]

We need beta testers!http://www.honeyclient.org/trac/wiki/download

Developers are welcome too!SVN repository is available, let us know if you’d like access