Honeypots and Tarpits
(drkt.eu)
from drkt@scribe.disroot.org to selfhosted@lemmy.world on 03 Jan 20:38
https://scribe.disroot.org/post/6463052
from drkt@scribe.disroot.org to selfhosted@lemmy.world on 03 Jan 20:38
https://scribe.disroot.org/post/6463052
threaded - newest
Op, if this is you, do not do this, especially not on your home IP.
Honeypots are a great way to find out exactly what your place is in the hierarchy of real black hats.
lol
Some day I’ll write an article on the selfhosted community
.
Howso? Does it attract hackers?
Hackers don’t poke around themselves, generally. They use bots and scripts to collect info and then return in person to pry open targets they want or find interesting.
Op is tarpitting with a stream, which is a telltale sign of a honeypot, nothing else behaves that way. So a bot crawling for content? Fine. A bot collecting info for suitable targets? Might get the attention of the person looking. And once you have a hacker’s attention, you might be in trouble if they’re competent and start pressing buttons.
You really have to know what you’re doing to understand where in the stack an attacker is going pull levers, which is as individual as people themselves.
This is quite wrong, but it doesn’t matter, because if your setup is insecure, then you’ll find out sooner or later anyway. The hacking space is pretty much automated at this point, which is why my honeypot works at all.
Do you also think that anyone who puts Anubis in front of their website is getting the attention of anonymous illuminati master-hackers because it causes their bots to waste a few processing cycles? Tarpitting is no different. If your bot is written poorly, it will get stuck on even legitimate pages.
what
Please go to a local ctf, even just a high school-level one.
I can’t engage with you when you can’t or won’t quote the full sentence. You are literally picking a section of a sentence, stripping it of context so it looks wrong, and then pretending I said that.
The point I am making is that the only way you’re getting into my network is if you’re sitting on a crazy 0day for Debian, Apache or PHP. My network isn’t a playground that I set up like a jigsaw for someone to “solve”. There’s nothing to solve, it’s not a CTF. You can’t dump points into a hacking skill and magically bypass some of the most vetted and battle-tested software in the world.
You need to chill out and not get so worked up about someone calling out your promotion of honeypots in a forum where the vast majority don’t even know the difference between DNS and PKI, and aren’t clear on the delineation between their LAN and the internet.
You misunderstand, I’m not implying your network is a CTF. I mean go to your local security group and watch how pen testers work. I can tell you they certainly do not fall for “tarpits”, even the fairly new kids.
Ultimately, you can do what you want, I obviously can’t stop you.
Oh wow you totally had me at first with your username… but now I’m on to you!!
It does not; tarpitting is a normal practice.
No one sitting on 0days are gonna waste them on randos, and my setup is secure besides. I’ve been doing this, and worse, for years.
Do you think a simple local honeypot could be useful for detecting compromised devices on a home network?
Large orgs that take their security seriously employ defensive honeypots internally to catch intruders, but I have no experience or expertise to offer besides that I know it’s a thing. :P
Every so once in a while I get the notion to run a honeypot, but it doesn’t seem prudent for me to attract that much attention to my network. I can already see the traffic using ntopng, and pfsense/unbound/suricata/pfblockng and robust ruleset do all the heavy lifting. I block everything, then only allow what is absolutely necessary. If it were run solely on a small VPS or droplet, it’d be an interesting project, but I’m not sure I want to poke the bear that much on my local network.
You shouldn’t run a honeypot for any other reason than fun and research, but if you’re into either of those, go for it!