Repository logo
 

Bitter harvest: Systematically fingerprinting low- and medium-interaction honeypots at internet scale

Accepted version
Peer-reviewed

Type

Conference Object

Change log

Authors

Abstract

The current generation of low- and medium interaction honeypots uses off-the-shelf libraries to provide the transport layer. We show that this architecture is fatally flawed because the protocols are implemented subtly differently from the systems being impersonated. We present a generic technique for systematically fingerprinting low- and medium interaction honeypots at Internet scale with just one packet and an ERR (Equal Error Rate) of 0.0183. We conduct Internet-wide scans and identify 7,605 honeypot instances across nine different honeypot implementations for the most important network protocols SSH, Telnet, and HTTP. For SSH honeypots we also determined their patch level and find that they are poorly maintained -- 27% of the honeypots have not been updated within the last 31 months and only 39% incorporate improvements from 7 months ago. We believe our findings to be a 'class break' in that trivial patches cannot address the issue.

Description

Keywords

Journal Title

12th USENIX Workshop on Offensive Technologies, WOOT 2018, co-located with USENIX Security 2018

Conference Name

12th USENIX Workshop on Offensive Technologies (WOOT 18)

Journal ISSN

Volume Title

Publisher

USENIX
Sponsorship
Engineering and Physical Sciences Research Council (EP/M020320/1)