×

Uh-oh, it looks like your Internet Explorer is out of date.

For a better shopping experience, please upgrade now.

Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community
     

Know Your Enemy: Revealing the Security Tools, Tactics, and Motives of the Blackhat Community

by The Honeynet Project
 
For centuries, military organizations have depended on scouts to gather intelligence on the enemy. Specifically, who the enemy was, what they were doing, how they may attack, the weapons they use, and their ultimate objectives. Time and again this information has proven critical in defending against and defeating the enemy.

For information security, this scout

Overview

For centuries, military organizations have depended on scouts to gather intelligence on the enemy. Specifically, who the enemy was, what they were doing, how they may attack, the weapons they use, and their ultimate objectives. Time and again this information has proven critical in defending against and defeating the enemy.

For information security, this scout has never existed. Very few organizations know who their enemy is, how they may attack, what the enemy does once they compromise a system, and why they attack. The Honeynet Project is changing this. A research organization of thirty security professionals, we are dedicated to learning the tools, tactics and motives of the blackhat community. Just as with scouts in the military, our mission is to gather intelligence on the enemy.

The primary weapon of the Honeynet Project is the Honeynet, a unique solution designed to capture and study the blackhat's every move. In this book you will learn in detail not only what we have discovered about this adversary, but how we built and used Honeynets to gather this critical information.

Know Your Enemy includes:

  • The Honeynet: Description of a honeynet, and how to plan, build, and maintain one. Also covers risks and issues involved.
  • The Analysis: Step-by-step instructions on how to capture and analyze data from a honeynet.
  • The Enemy: Presents what the project learned about the blackhat community, including documented compromised systems.
Aimed at both security professionals and those with a non-technical background, this book teaches the technical skills needed to study a blackhat attack and learn from it. The CD includes examples of network traces, code, system binaries, and logs used by intruders from the blackhat community.

Editorial Reviews

bn.com
The Barnes & Noble Review
If you're responsible for protecting networks against crackers, you need to clearly understand your adversary. But there's an enormous amount of misinformation and disinformation about the "blackhats." What's the best way to learn how they really work? With a "honeynet": a live network built specifically to attract bad guys and wired to control, capture, and contain their traffic, so it can be tracked and analyzed.

Some 30 security professionals created the Honeynet Project to build such a network. This book tells you what they've learned, and it's fascinating reading. Over two years, they've been able to extrapolate a remarkable amount of knowledge about the blackhats' tools, techniques, motives, and psychology ("the social structure of the blackhat community is a robust, strong, complex meritocracy with very stable characteristics"). Especially fascinating is Know Your Enemy's chapter full of annotated IRC conversations from a group of crackers who took over Spitzer's honeynet, notably "D1ck," an overweight 17-year-old living with his parents in Karachi, Pakistan.

You may find the honeynet concept so intriguing that you'd want to build your own. Know Your Enemy shows you how. Lance Spitzer covers each element of a honeynet, walks through constructing one that looks sufficiently real without putting actual corporate IT assets at risk, and then shows how to analyze the traces your "friends" leave behind. There's even a CD-ROM full of network traces, logs, images of actual compromises, and source code for your very own 21st-century "Spy vs.Spy" initiative. (Bill Camarda)

Bill Camarda is a consultant, writer, and web/multimedia content developer with nearly 20 years' experience in helping technology companies deploy and market advanced software, computing, and networking products and services. He served for nearly ten years as vice president of a New Jersey–based marketing company, where he supervised a wide range of graphics and web design projects. His 15 books include Special Edition Using Word 2000 and Upgrading & Fixing Networks For Dummies®, Second Edition.

Product Details

ISBN-13:
9780201746136
Publisher:
Pearson Education
Publication date:
08/31/2001
Edition description:
Older Edition
Pages:
352
Product dimensions:
7.41(w) x 9.24(h) x 0.91(d)

Read an Excerpt

Chapter 1: The Battleground

My commander used to tell me that to defend against the enemy, you have to first know who your enemy is: their methods of attack, tools and tactics, and objective. This military doctrine readily applies to network security just as it did in the Army. The blackhat community is the adversary; we must defend against this threat. However, to be successful, we must first know our enemy.

When I first entered the field of network security, I was frustrated by the lack of information about the blackhat community. It was easy to find technical information on exploits, scanners, and various other attacker tools. But these play only a small part in the overall picture. I wanted to know more. What are the attackers' goals? What are attackers trying to achieve? Why? How do they identify vulnerable systems and then compromise them? What happens once attackers control a system? How do they communicate among themselves? Are we dealing with a single threat or a variety of threats?

Many of these questions were ones we asked in the military; in the military, however, we had answers. Specific organizations, commonly called military intelligence, or S2, were dedicated to obtaining and disseminating information on the enemy. The more we knew about the enemy, the better we could defend ourselves. As a tank officer, for example, I was expected to have an intimate knowledge of Soviet armored tactics and capabilities. I was expected to know the technical makeup of a single Soviet tank company. We were trained on the tank's range, speed, and performance capabilities. We read books on the history and political structure of our threat. We conducted hands-on training of captured equipment. This information is critical for defending against this threat. By knowing the tank's range, I can estimate when the enemy will begin opening fire on me and thus when I should begin firing back. By knowing the speed of the enemy's tanks, I will know how much lead time I should have when I call in for artillery fire. By knowing the performance of the enemy's tanks—its rate of fire- I can estimate how many rounds the enemy can fire at me in a minute and the probability of hits. By crawling around inside a captured T-72, I had a better understanding of the visual capabilities of the crew inside. All this information is critical in defending against my opponent. The more information I have, the better I can stop and defeat that enemy.

What amazed me in the field of network security was the lack of this type of intelligence. I found little information on who the enemy was, how it attacked, what the motivations or the tactics involved were. The security community was focused on the specific technical tools used by the blackhat community and the tools used in defense but not in the tactics or motives involved. What I wanted to learn was how the blackhat community was identifying and probing for vulnerable systems. What happened once a system was compromised? What activity was going on that I did not know about? I had a lot of questions but very few answers, and this scared me. It was my job to protect against a threat, an enemy. But I did not even know who my enemy was, let alone its tools and techniques. I wanted to learn more, but how could I do so?

It took several years to develop a solution. The plan is simple: Have the enemy teach us its own tools, tactics, and motivations. Why attempt to develop theory when you can have the blackhats show you step-by-step how they operate? No other source is more reliable or more complete. In the military, some consider this battlefield intelligence, whereby you gather information from the enemy. In network security, we can attempt to do the same. We will let the blackhats teach us how they operate. Now the question is, How do you gather battlefield intelligence when you don't even know where the battlefield is?

For me, the battlefield landed in my wife's dining room in 1998. In the beginning of that year, I received my first dedicated connection to the Internet. Anyone in the world had access to my network at home, at any time. At first, I had no idea what security implications this meant; I did not realize just how aggressive a war is going on in cyberspace. Fortunately, I was researching firewall logs at the time and detected a great deal of suspicious traffic probing my network. I decided to learn more about this traffic, so I researched a variety of papers on the Internet. Although I found a wealth of technical information, most of it focused on specific exploits or the tools used in the exploits. I found little in the way of intelligence on the bad guys. I wanted to learn more but was not sure how. I decided to place a production system on my network, closely monitor this system, and then wait and see what happened. My intent was to have the blackhat community show me how it operates by probing, attacking, and exploiting the system. I used a default installation of Linux Red Hat 5.0, a version of the UNIX operating system, and connected it to the exposed network. I had no idea what to expect. Would anyone even find the system? If so, how long would it take? Would the system be attacked, and what would happen once the system was compromised? All these were questions I was hoping to answer, but would the solution work? On February 25, 1999, I connected the system to my network. Within 15 minutes, my system had been identified, probed, and exploited. Little did I know at the time, but an idea was born.

I learned a lot from that experience, mainly how not to set up such an environment. After compromising the system, the blackhat quickly figured that some-thing was not right, erased the hard drive, and never returned. I lost most of the valuable data that could have been gained, such as the blackhat's keystrokes, toolkits, and system activities. Little was learned, but I had proof that this could be done. By placing production systems on a network and then monitoring all the activity to and from that system, it is possible to learn more about the enemy.

Over time, this concept grew into the Honeynet Project, 30 security professionals dedicated to learning the tools, tactics, and motives of blackhats and sharing those lessons learned. The group learns by building production systems and then monitoring all activity to and from the systems. We capture and analyze data as these systems are probed, attacked, and exploited. Everyone volunteers time and unique skills in the research and development of the project. By combining our skills and knowledge, we can exponentially increase our learning about the blackhat community. We then share this information with the security community. The end goal is to improve our understanding of the enemy. Armed with this knowledge, we and the security community can better defend against the blackhat community. What makes us unique is that we share as much as possible with the security community; we want everyone to benefit from our research. The more people who understand how the enemy works, the more secure systems will be, which indirectly benefits everyone.

The project began informally in April 1999. I needed help in developing methods to capture blackhat activity. The system compromised in February demonstrated the need to develop more comprehensive and sophisticated methods for data capture. Once the data was captured, I also needed help in analyzing it. I just did not understand a great deal of network and system activity, such as decoding a specific exploit captured from the network. I asked certain members of the community to assist me. Fortunately, the security community is made up of many dedicated and helpful individuals. For example, Marty Roesch, developer of Snort, coded new functionality into the IDS (intrusion detection system) just to help our research—in this case, keystroke logging, called session breakout. Max Vision stepped up to help with sophisticated exploit attacks, decoding exploits based on their network signature. Without the help of these and other members, the project would not have been possible.

Honeynets capture all sorts of unusual network and blackhat activity. No single person can understand all the issues involved. Our small group continued to grow as we realized that we needed the expertise of a larger group of people. Over the next year, the project informally grew as more people were willing to help. Each individual had unique skills, experiences, and backgrounds that contributed to the project. However, we all shared a common motivation: to learn about the blackhat community and to share those lessons learned. We were not a highly organized group; many of us had never met in person. We infrequently shared information via e-mail in attempting to improve the Honeynet concept or to decode a specific signature or attack.

This all dramatically changed in June 2000, when a Solaris 2.6 honeypot was compromised by an organized blackhat group that used our honeypot to communicate among themselves. For a three-week period, we captured all their conversations. Tracking all this activity required the skills of the entire group, from decoding specific IRC (Internet relay chat) configurations to translating Urdu into English. This event helped galvanize our informal group into an organized project.

We had never even considered ourselves an organized group until then. In fact, the name Honeynet Project was created at the last minute, as we had to call ourselves and our research something when our findings were released. Since then, the group has attracted additional members, such as psychologist Max Kilger, Ph.D., who focuses on blackhat behavior. We have also established relationships with various national and international organizations. We continue to develop our techniques and research, always sharing with the security community our lessons learned. This book represents another step in sharing that information.

The key tool that the team uses is called a Honeynet, a network designed to be compromised. We can then learn who our adversary is and how it operates. Every packet that enters and leaves the Honeynet is captured and analyzed. Every action on the systems is logged and secured. The beauty of the project is that there is no theory. The blackhats show us step-by-step how they operate in the real world. Once we have gathered this information, we can then review the data and better establish who the enemy is and understand its goals, motives, and methods of operation.

Throughout this book, we use the term blackhat to represent the enemy, the attacker. Many people have used the term hacker, cracker, or a variety of other labels. We prefer not to get involved in the political debate of what words define which users. We standardize on using the term blackhat to mean the bad guys, the enemy. The enemy can be male or female, a disgruntled company employee, a teenager in South East Asia, or a highly trained former KGB agent. In many cases, you will not know the identity of the enemy. In some cases, we have been able to identify the individual(s) and have noted that here whenever possible. Often, however, the only identity you can assign is the term blackhat. Regardless, this is the individual or entity attempting unauthorized activity with one of your resources.

The common theme throughout this book is learning about our adversary, the blackhat community. In Chapters 2, 3, and 4, we introduce you to the Honeynet, the primary learning tool of the Honeynet Project. We discuss what these production systems are; their value; how we build, use, and maintain them; and the risks/issues involved. In Chapters 5–8, we cover how we use Honeynets to capture the blackhat activity and then analyze the captured data. Based on this analysis, we are able to learn the tools, tactics, and motives of the blackhat community. Our analysis includes system forensics, packet analysis, and log review. In Chapters 9–12, we review what we have learned about the blackhat community from some well-documented compromises. This will show you step-by-step how the enemy thinks and acts. We attempt to discuss as little theory as possible and focus instead on what we have learned. The end goal of the book is to teach you

  • The Honeynet: What a Honeynet is, its value to the security community, how a Honeynet works, and the risks and issues involved

  • The Analysis: How to analyze captured data and from that learn the tools, tactics, and motives of the blackhat community

  • The Enemy: What we have learned about the blackhat community
We hope that you learn and have as much fun with this book as we have had in the past several years....

Meet the Author

The Honeynet Project is a group of thirty security professionals dedicated to learning the tools, tactics, and motives of blackhats and sharing those lessions learned. Each individual in the group has unique skills, experiences, and backgrounds that contribute to the project.

Customer Reviews

Average Review:

Post to your social network

     

Most Helpful Customer Reviews

See all customer reviews