These classnotes are depreciated. As of 2005, I no longer teach the classes. Notes will remain online for legacy purposes

UNIX03/Introduction To Thp

Classnotes | UNIX03 | RecentChanges | Preferences

From thp's READTHIS file:

CONCEPT
The concept is simple: listen and record. The only problem is that the badguys can't speak until after a connection comes up. So we give them one. On any port they want. Period. Upon connecting, they are presented with a greeting (I use fortune) and a root prompt. W00p! They are leet. If you prefer a silent listener (no greeting or prompt), that's cool, too. See the section xinetd.d/inetd, below. Script kiddeez are your best entertainment value!

In a nutshell:

  1. New connections to a given port are handed off to a Perl script.
  2. That Perl script builds two files: a running connection tracker, and a unique session file, into which we merely capture all data.
  3. iptables REDIRECT is used to pass all incoming connection requests, regardless of destination port, to that listener.
  4. In order for the intruder-to-be to know what port a service is listening on, they need to ask the target system's portmapper. So we fire up a portmapper, and feed it bogus mappings for every service we can.
  5. Capture, and repeat.

thp is not an extensive Honeypot. It is not as full-featured as HoneyD? or LaBrea?. It is very simple. But it will give you a rough idea of the potential of such a program.



Classnotes | UNIX03 | RecentChanges | Preferences
This page is read-only | View other revisions
Last edited June 28, 2003 2:15 am (diff)
Search:
(C) Copyright 2003 Samuel Hart
Creative Commons License
This work is licensed under a Creative Commons License.