HoneyNet Looks to Stick Hackers

Tyler Durden camera_lumina at hotmail.com
Thu Apr 17 13:35:10 PDT 2003


Anyone know what kind of encryption is being discussed below? (ie, that 
hackers use to communicate with each other)

-TD



HoneyNet Looks to Stick Hackers

--------------------------------------------------------------------------------

Online vandals and stalkers beware. A group of security professionals called 
The HoneyNet Project, has just made it easier for law enforcement to 
stealthily track the behavior of online evil-doers.

On Monday, the volunteer group, which consists of two dozen computer 
security, information intelligence, and psychology professionals, released 
the second version of its how-to-build-a-honeynet software, a tool used by 
law enforcement and others interested in security issues to track the 
behavior of hackers.

For those folks not down with security lingo, a honeynet expands on the 
concept of a honeypot, a software application that pretends to be a server 
on the Internet and lures unsuspecting hackers to it. A honeynet is a 
collection of these honeypots networked together. When hackers (or 
blackhats, as theyre known in security circles) enter the honeynet, they 
are watched closely by a combination of surveillance technologies.

Youre really playing with fire in this type of environment, says Lance 
Spitzner, a security architect at Sun Microsystems Inc. (Nasdaq: SUNW - 
message board) and founder of the four-year old HoneyNet Project. The whole 
point is to observe the bad guys as they go about their work in a controlled 
setting without them knowing it.

The way it works is an intrusion-detection system triggers a virtual alarm 
whenever an attacker breaches security on one of the networked computers. 
Meanwhile, an administrator watches everything the intruder types, from 
commands to emails to chat sessions. A separate firewall is set up to cut 
the hacker off from the Internet anytime he tries to attack another system 
from the honeynet.

Proponents say the latest HoneyNet release includes the following 
improvements over previous versions:


The software is prepackaged for easy setup and comes for installation on a 
single server.


A new utility called Honey Inspector, which will be released soon, will 
allow honeypots within the honeynet to be managed and analyzed through a 
graphical user interface. Eventually, the HoneyNet Project expects to 
release a bootable CD-ROM that will make installing its version of a 
honeynet even easier.


Software includes improvements for breaking encryption codes that hackers 
often use to communicate with each other.


The designers claim to have made it harder for hackers to detect that 
theyve been lured into a honeynet. In the previous version of software, all 
the surveillance was done at Layer 3. Hackers had to pass through a Layer 3 
gateway when entering the honeynet, which often tipped them off to what was 
happening. But now HoneyNet uses a Layer 2 bridging gateway, making any 
surveillance invisible to the hacker.


The upgrade includes an enhanced firewall that blocks harmful attacks, while 
still allowing hackers to communicate with their associates outside the 
honeynet. The longer we can keep them in the honeynet without them 
realizing what is going on, the more information we can gather, says 
Spitzner. We want them talking to their buddies on the Internet, but we 
dont want them causing anymore harm.

So are the Honeynet Project volunteers some sort of cyber police force? Not 
at all. The not-for-profit groups only purpose is to observe and learn 
about hacker behavior and share that information with the public. Thats not 
to say that the information and tools gathered cant be used to catch bad 
guys. Government agencies like the United States Department of Homeland 
Security and the Federal Bureau of Investigation (FBI) already use HoneyNet 
Project information and techniques in their work.

The HoneyNet Project is not designed for commercial use, according to 
Spitzner. He says it wouldnt make much sense for an enterprise to spend the 
resources to build such a network. But network security might use the tools 
to learn more about hackers and recommend strategies to clients.

All software on the HoneyNet Project Website is free to download by anyone. 
For more information, go to The HoneyNet Project.

 Marguerite Reardon, Senior Editor, Light Reading






_________________________________________________________________
Tired of spam? Get advanced junk mail protection with MSN 8. 
http://join.msn.com/?page=features/junkmail





More information about the cypherpunks-legacy mailing list