Honeypots and Tarpits (drkt.eu)
from drkt@scribe.disroot.org to selfhosted@lemmy.world on 03 Jan 20:38
https://scribe.disroot.org/post/6463052

#selfhosted

threaded - newest

non_burglar@lemmy.world on 03 Jan 22:47 next collapse

Op, if this is you, do not do this, especially not on your home IP.

Honeypots are a great way to find out exactly what your place is in the hierarchy of real black hats.

drkt@scribe.disroot.org on 03 Jan 23:05 next collapse

lol

Some day I’ll write an article on the selfhosted community

[deleted] on 04 Jan 02:38 collapse

.

kayzeekayzee@lemmy.blahaj.zone on 04 Jan 01:53 collapse

Howso? Does it attract hackers?

non_burglar@lemmy.world on 04 Jan 02:35 next collapse

Hackers don’t poke around themselves, generally. They use bots and scripts to collect info and then return in person to pry open targets they want or find interesting.

Op is tarpitting with a stream, which is a telltale sign of a honeypot, nothing else behaves that way. So a bot crawling for content? Fine. A bot collecting info for suitable targets? Might get the attention of the person looking. And once you have a hacker’s attention, you might be in trouble if they’re competent and start pressing buttons.

You really have to know what you’re doing to understand where in the stack an attacker is going pull levers, which is as individual as people themselves.

drkt@scribe.disroot.org on 04 Jan 06:42 next collapse

nothing else behaves that way.

This is quite wrong, but it doesn’t matter, because if your setup is insecure, then you’ll find out sooner or later anyway. The hacking space is pretty much automated at this point, which is why my honeypot works at all.

Do you also think that anyone who puts Anubis in front of their website is getting the attention of anonymous illuminati master-hackers because it causes their bots to waste a few processing cycles? Tarpitting is no different. If your bot is written poorly, it will get stuck on even legitimate pages.

non_burglar@lemmy.world on 04 Jan 14:48 collapse

it will get stuck on even legitimate pages

what

Please go to a local ctf, even just a high school-level one.

drkt_@lemmy.dbzer0.com on 04 Jan 19:50 collapse

I can’t engage with you when you can’t or won’t quote the full sentence. You are literally picking a section of a sentence, stripping it of context so it looks wrong, and then pretending I said that.

If your bot is written poorly, it will get stuck on even legitimate pages.

The point I am making is that the only way you’re getting into my network is if you’re sitting on a crazy 0day for Debian, Apache or PHP. My network isn’t a playground that I set up like a jigsaw for someone to “solve”. There’s nothing to solve, it’s not a CTF. You can’t dump points into a hacking skill and magically bypass some of the most vetted and battle-tested software in the world.

non_burglar@lemmy.world on 04 Jan 22:48 collapse

You need to chill out and not get so worked up about someone calling out your promotion of honeypots in a forum where the vast majority don’t even know the difference between DNS and PKI, and aren’t clear on the delineation between their LAN and the internet.

There’s nothing to solve, it’s not a CTF.

You misunderstand, I’m not implying your network is a CTF. I mean go to your local security group and watch how pen testers work. I can tell you they certainly do not fall for “tarpits”, even the fairly new kids.

Ultimately, you can do what you want, I obviously can’t stop you.

fort_burp@feddit.nl on 04 Jan 20:17 collapse

Oh wow you totally had me at first with your username… but now I’m on to you!!

drkt@scribe.disroot.org on 04 Jan 06:09 collapse

It does not; tarpitting is a normal practice.

No one sitting on 0days are gonna waste them on randos, and my setup is secure besides. I’ve been doing this, and worse, for years.

kayzeekayzee@lemmy.blahaj.zone on 04 Jan 17:03 next collapse

Do you think a simple local honeypot could be useful for detecting compromised devices on a home network?

drkt_@lemmy.dbzer0.com on 04 Jan 19:42 collapse

Large orgs that take their security seriously employ defensive honeypots internally to catch intruders, but I have no experience or expertise to offer besides that I know it’s a thing. :P

irmadlad@lemmy.world on 04 Jan 18:16 collapse

Every so once in a while I get the notion to run a honeypot, but it doesn’t seem prudent for me to attract that much attention to my network. I can already see the traffic using ntopng, and pfsense/unbound/suricata/pfblockng and robust ruleset do all the heavy lifting. I block everything, then only allow what is absolutely necessary. If it were run solely on a small VPS or droplet, it’d be an interesting project, but I’m not sure I want to poke the bear that much on my local network.

drkt@scribe.disroot.org on 05 Jan 07:38 collapse

You shouldn’t run a honeypot for any other reason than fun and research, but if you’re into either of those, go for it!