As security practitioners, whether we are doing penetration testing or doing drill defense, we have all come into contact with honeypots to some extent. However, there are always a lot of words that appear with honeypots, such as honey bait, honey tag, honeynet, honey farm... What do these words mean? Today, I will use an article to explain all these concepts clearly.
The word honeypot was first used by hunters, that is, people who go hunting in the mountains. Hunters fill a jar with honey and set a trap to catch bears who like sweets. Later, in the field of network security, people called the bait that deceives attackers "honeypot". A honeypot needs to be deployed based on a node. It may look like a Raspberry Pi, a camera, or a printer. It can be deployed at any network location and is usually used to collect attack intelligence reaching a specific network node and mitigate attacks on other production equipment and resources in the same network segment. The working principle of a honeypot is simple and easy to understand. A successful honeypot is often disguised as a very attractive system. After the attacker enters, they may obtain the important data they want. However, from the moment the attacker enters, their actions will be fully recorded by the honeypot, becoming important information in the hands of the defender. Moreover, the business in the honeypot is not real, and the attacker will work in vain in the honeypot and gain nothing. 2. What is honey bait? Honey bait is generally a file, and its working principle is similar to that of a honeypot, which also tricks attackers into opening or downloading it. When hackers see files such as "XX second half work plan.docx", "XX environment operation and maintenance manual.pdf", and "employee salary list-20210630.xslx", they often find it difficult to resist the urge to download them, and thus fall into the trap of the defender. When the defender finds that the files here have traces of being opened or the attacker performs some operations based on the content of the honey bait file, they can trace the source and find the compromised device. 3. What is a honey label? We can further modify the honey bait and embed a hidden link in a Word document or PDF document. When the attacker opens the file, the link can be automatically triggered, and the defender can take the opportunity to obtain the attacker's real network address, browser fingerprint and other information, thereby directly tracing the attacker's true identity. This kind of honey bait with a URL address is a honey tag. 4. What is a Honeynet? When we use honeypots, we often put many honeypots in a network to increase the chances of attackers hitting honeypots. Simply put, "a honeynet is a large area of honeypots connected into a network", but this "network" needs to be strongly related to the business. When attackers try to break into our system, in order to get what they want (business data, files, etc.), they often focus on attacking nodes related to the business. Therefore, we can refer to the real business environment and place honeypots on the attacker's path, providing the attacker with space for lateral movement and more abundant intrusion interfaces. In this way, when the attacker steps on a series of honeypots, we can easily see the attacker's methods and habits. This highly complex bait environment is called a honeynet. Different business scenarios have different network topologies, and different workflows have different status update and control requirements. Therefore, building an effective honeynet is a big challenge for security personnel. 5. What is a honey farm? Although honeynets are good, they are still a bit troublesome to use. Not only do they require a lot of management and maintenance work, but they also need to prevent the honeypot from being breached and the attacker from escaping from the honeypot to continue doing bad things. So how can we use honeypots without much effort and trouble? The answer is to centralize malicious access and manage it in a unified way. As a result, honey farms that use redirection technology came into being. Honey farms are also a form of distributed honeypots, but in honey farms, attackers hit virtual honeypots, which are then redirected to real honeypots that respond to them and then pass the responses to virtual honeypots.
(6) I also want to get a set of “honey farm + honey label”, how should I start? Here I would like to recommend the domestic HFish free honeypot (https://hFish.io). HFish is a honeypot framework written by a Chinese developer. It is easy to use and has friendly documentation. After 16 months of launch, HFish has received 2.6k stars on Github and has become a TOP5 GVP project in the security category on Gitee in China. At present, new versions are constantly being released, and all enterprises and individual users are authorized to use it permanently for free. |
>>: 5G reveals three aspects of value in eliminating educational anxiety and chronic diseases
Port Security Technology Background The enterpris...
Recently, the "Xinzhi Award·4th Excellent Fi...
RAKsmart is a foreign hosting company operated by...
The large-scale deployment of IPv6 networks has b...
RackNerd has launched its 2021 New Year promotion...
Tudcloud is a newly opened hosting company that p...
In project practice, we have spent a lot of money...
The total global IoT spending is estimated to rea...
How many 5G frequency bands a mobile phone can su...
At the 6G Internet of Things Forum of the 4th Chi...
Many network engineers and network administrators...
At the Brazil Olympics, the 4×400 relay race is t...
【51CTO.com Quick Translation】According to Gartner...
Do you remember the last time you expressed your ...
On August 7, a team of domestic developers and le...