SlideShare ist ein Scribd-Unternehmen logo
1 von 1
Downloaden Sie, um offline zu lesen
Modern	
  Honey	
  Network	
  
Internal Breach Monitoring & Detection
with the Modern Honey Network
Jason	
  Trost	
  
Director	
  of	
  ThreatStream	
  Labs	
  
FloCon	
  2015	
  
January	
  12-­‐15	
  2015	
  |	
  Portland,	
  OR	
  	
  
	
  
Enterprise	
  Deployment	
  DMZ	
  Deployment	
  
Enterprise	
  
Network	
  
Modern	
  Honey	
  Network	
  (MHN)	
  
-­‐	
  Free	
  and	
  Open	
  Source	
  (GPLv3)	
  PlaIorm	
  for	
  
deploying	
  and	
  managing	
  Honeypots.	
  
-­‐	
  Makes	
  deploying	
  honeypots	
  easy	
  
-­‐	
  Includes	
  APIs	
  for	
  leveraging	
  all	
  data	
  collected	
  
-­‐	
  Leverages:	
  Python/Flask,	
  hpfeeds,	
  
mnemosyne,	
  honeymap,	
  and	
  MongoDB	
  
-­‐	
  Sensors	
  Supported:	
  Dionaea,	
  Conpot,	
  Snort,	
  
Kippo,	
  Glastopf,	
  Amun,	
  Wordpot,	
  Shockpot,	
  p0f	
  
	
  
-­‐	
  Deploy	
  honeypots	
  on	
  DMZ	
  LAN	
  
-­‐	
  Accessible	
  by	
  other	
  DMZ	
  hosts,	
  but	
  not	
  exposed	
  to	
  the	
  
public	
  Internet	
  (reduces	
  noise)	
  
-­‐	
  Aims	
  to	
  catch	
  compromises	
  of	
  DMZ	
  hosts	
  if	
  they	
  start	
  
scanning	
  
-­‐	
  Meant	
  to	
  augment	
  exisYng	
  detecYon	
  and	
  monitoring	
  
technologies,	
  not	
  replace	
  them	
  
-­‐	
  Low	
  Noise:	
  Compromised	
  systems,	
  Lateral	
  movement	
  
aZempts,	
  misconfigured	
  systems,	
  misbehaving	
  internal	
  
hosts,	
  penetraYon	
  testers	
  
-­‐	
  Deploy	
  alongside	
  enterprise	
  workstaYons	
  and	
  servers	
  
-­‐	
  Configure	
  to	
  mimic	
  real	
  systems	
  as	
  much	
  as	
  possible	
  
including	
  DNS	
  entries	
  
-­‐	
  Only	
  discoverable	
  by	
  network	
  probes	
  or	
  DNS	
  zone	
  transfers	
  
(i.e.	
  don’t	
  adverYse	
  that	
  they	
  are	
  there)	
  
-­‐	
  Low	
  Noise:	
  Compromised	
  systems,	
  Lateral	
  movement	
  
aZempts,	
  misconfigured	
  systems,	
  misbehaving	
  internal	
  hosts,	
  
penetraYon	
  testers	
  
-­‐	
  Any	
  interacYon	
  with	
  honeypots	
  should	
  be	
  invesYgated	
  
Ingest	
   Viz	
  
Architecture	
  
APIs	
  
syslog	
   SIEM	
  alerts	
  
hZps://github.com/threatstream/mhn	
  
-­‐	
  Sensors	
  report	
  events	
  in	
  real-­‐Yme	
  via	
  hpfeeds	
  
-­‐	
  Events	
  are	
  enriched,	
  indexed,	
  and	
  stored	
  in	
  MongoDB	
  
-­‐	
  MHN	
  Web	
  app	
  enables	
  exploraYon	
  and	
  visualizaYon	
  
-­‐	
  JSON	
  APIs	
  expose	
  events	
  for	
  integraYon	
  with	
  other	
  systems	
  
	
  
DMZ	
  Internet	
   Internal	
  
Network	
  

Weitere ähnliche Inhalte

Andere mochten auch

Andere mochten auch (9)

BSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes
BSidesNYC 2016 - An Adversarial View of SaaS Malware SandboxesBSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes
BSidesNYC 2016 - An Adversarial View of SaaS Malware Sandboxes
 
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
Deploying, Managing, and Leveraging Honeypots in the Enterprise using Open So...
 
SANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat IntelligenceSANS CTI Summit 2016 Borderless Threat Intelligence
SANS CTI Summit 2016 Borderless Threat Intelligence
 
Modern Honey Network (MHN)
Modern Honey Network (MHN)Modern Honey Network (MHN)
Modern Honey Network (MHN)
 
Anomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat IntelligenceAnomali Detect 2016 - Borderless Threat Intelligence
Anomali Detect 2016 - Borderless Threat Intelligence
 
R-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat IntelligenceR-CISC Summit 2016 Borderless Threat Intelligence
R-CISC Summit 2016 Borderless Threat Intelligence
 
Anomaly Detection - New York Machine Learning
Anomaly Detection - New York Machine LearningAnomaly Detection - New York Machine Learning
Anomaly Detection - New York Machine Learning
 
Anomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) EnglishAnomaly detection in deep learning (Updated) English
Anomaly detection in deep learning (Updated) English
 
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSECSosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
Sosyal Medyada Anonim Hesaplar Nasıl Tespit Edilir? - NETSEC
 

Kürzlich hochgeladen

怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
nirzagarg
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
chadhar227
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
q6pzkpark
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
vexqp
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
gajnagarg
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
ranjankumarbehera14
 

Kürzlich hochgeladen (20)

怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
怎样办理圣地亚哥州立大学毕业证(SDSU毕业证书)成绩单学校原版复制
 
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATIONCapstone in Interprofessional Informatic  // IMPACT OF COVID 19 ON EDUCATION
Capstone in Interprofessional Informatic // IMPACT OF COVID 19 ON EDUCATION
 
Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........Switzerland Constitution 2002.pdf.........
Switzerland Constitution 2002.pdf.........
 
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
Top profile Call Girls In Bihar Sharif [ 7014168258 ] Call Me For Genuine Mod...
 
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24  Building Real-Time Pipelines With FLaNKDATA SUMMIT 24  Building Real-Time Pipelines With FLaNK
DATA SUMMIT 24 Building Real-Time Pipelines With FLaNK
 
Gartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptxGartner's Data Analytics Maturity Model.pptx
Gartner's Data Analytics Maturity Model.pptx
 
Data Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdfData Analyst Tasks to do the internship.pdf
Data Analyst Tasks to do the internship.pdf
 
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
SAC 25 Final National, Regional & Local Angel Group Investing Insights 2024 0...
 
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptxThe-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
The-boAt-Story-Navigating-the-Waves-of-Innovation.pptx
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
SR-101-01012024-EN.docx  Federal Constitution  of the Swiss ConfederationSR-101-01012024-EN.docx  Federal Constitution  of the Swiss Confederation
SR-101-01012024-EN.docx Federal Constitution of the Swiss Confederation
 
Abortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get CytotecAbortion pills in Jeddah | +966572737505 | Get Cytotec
Abortion pills in Jeddah | +966572737505 | Get Cytotec
 
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
一比一原版(曼大毕业证书)曼尼托巴大学毕业证成绩单留信学历认证一手价格
 
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
怎样办理旧金山城市学院毕业证(CCSF毕业证书)成绩单学校原版复制
 
7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt7. Epi of Chronic respiratory diseases.ppt
7. Epi of Chronic respiratory diseases.ppt
 
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
Top profile Call Girls In bhavnagar [ 7014168258 ] Call Me For Genuine Models...
 
Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1Lecture_2_Deep_Learning_Overview-newone1
Lecture_2_Deep_Learning_Overview-newone1
 
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book nowVadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
Vadodara 💋 Call Girl 7737669865 Call Girls in Vadodara Escort service book now
 
Harnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptxHarnessing the Power of GenAI for BI and Reporting.pptx
Harnessing the Power of GenAI for BI and Reporting.pptx
 

Augmenting Netflow with the Honeypot Data for Internal Breach Monitoring and Detection

  • 1. Modern  Honey  Network   Internal Breach Monitoring & Detection with the Modern Honey Network Jason  Trost   Director  of  ThreatStream  Labs   FloCon  2015   January  12-­‐15  2015  |  Portland,  OR       Enterprise  Deployment  DMZ  Deployment   Enterprise   Network   Modern  Honey  Network  (MHN)   -­‐  Free  and  Open  Source  (GPLv3)  PlaIorm  for   deploying  and  managing  Honeypots.   -­‐  Makes  deploying  honeypots  easy   -­‐  Includes  APIs  for  leveraging  all  data  collected   -­‐  Leverages:  Python/Flask,  hpfeeds,   mnemosyne,  honeymap,  and  MongoDB   -­‐  Sensors  Supported:  Dionaea,  Conpot,  Snort,   Kippo,  Glastopf,  Amun,  Wordpot,  Shockpot,  p0f     -­‐  Deploy  honeypots  on  DMZ  LAN   -­‐  Accessible  by  other  DMZ  hosts,  but  not  exposed  to  the   public  Internet  (reduces  noise)   -­‐  Aims  to  catch  compromises  of  DMZ  hosts  if  they  start   scanning   -­‐  Meant  to  augment  exisYng  detecYon  and  monitoring   technologies,  not  replace  them   -­‐  Low  Noise:  Compromised  systems,  Lateral  movement   aZempts,  misconfigured  systems,  misbehaving  internal   hosts,  penetraYon  testers   -­‐  Deploy  alongside  enterprise  workstaYons  and  servers   -­‐  Configure  to  mimic  real  systems  as  much  as  possible   including  DNS  entries   -­‐  Only  discoverable  by  network  probes  or  DNS  zone  transfers   (i.e.  don’t  adverYse  that  they  are  there)   -­‐  Low  Noise:  Compromised  systems,  Lateral  movement   aZempts,  misconfigured  systems,  misbehaving  internal  hosts,   penetraYon  testers   -­‐  Any  interacYon  with  honeypots  should  be  invesYgated   Ingest   Viz   Architecture   APIs   syslog   SIEM  alerts   hZps://github.com/threatstream/mhn   -­‐  Sensors  report  events  in  real-­‐Yme  via  hpfeeds   -­‐  Events  are  enriched,  indexed,  and  stored  in  MongoDB   -­‐  MHN  Web  app  enables  exploraYon  and  visualizaYon   -­‐  JSON  APIs  expose  events  for  integraYon  with  other  systems     DMZ  Internet   Internal   Network