Back to Cracked, Wiped, Recovered, and Curious.
After putting up my honeypot, I started watching the people who logged into it and documenting what they did. This page was the summary page for that little rogues’ gallery.
Related Pages
News
- 2000-12-09: blunt secured my system for me. Thanks, but no thanks.
- 2000-11-29: blunt came back,
patched my system binaries, found
/usr/bin/hunt, and wiped out fone’s home directory.
Introduction: It Beats Tamagotchi!
On Nov 12, 2000, I put up my honeypot and monitored
it with tcpdump. I was an amateur at network security and wanted to see for
myself how crackers operated. By Nov 26, 2000, my honeypot had five extra root
accounts. Two of them, fone and
blunt, were actively telnetting into the
honeypot.
It was like having a cockroach ranch. My pet crackers confirmed the common cracker image I had at the time: they did not seem very bright, and their only motivation was cracking as many systems as possible.
Observations
- They used well-published exploits like
rpc,amd, andwu-ftpto get in. - Each cracker might connect from several different IPs, presumably previously compromised systems. It seemed worth collecting the IPs so I could warn the admins.
- Once in the system, they were surprisingly incurious about what it contained. I even put some of my old files on the honeypot to keep their interest, and they were oblivious.
- Their main goal seemed to be learning about cracking. My first pet,
fone, could not even do
rm -rf /var/log/*at first. - Eventually, fone figured out how to remove the logs, clumsily, and replace the system binaries. I thought this was clever until I saw what he actually did:
mv /bin/ps /bin/.ps
printf '#! /bin/sh\n/bin/.ps | sed -d [fFone]\n' > /bin/ps- I assumed they would eventually try to crack other systems from my honeypot. Was that really the whole goal, to mindlessly compromise as many systems as possible?
Reading My Tcpdump Files
The detailed pages for fone and blunt include the observations I kept from their sessions.
I recorded all traffic to the honeypot with tcpdump like this:
tcpdump -n -e -l -p -vv -s 2000 -w $(date +"%s").tcpdump -i eth1 > out 2>&1 &You could then inspect one of the files with Ethereal:
ethereal -nr xxxx.tcpdumpAt the time there were also known issues with some Red Hat tcpdump files.
If your tcpdump program could not read one of mine, Ethereal or editcap
were the tools I recommended trying.
I also wrote a small script to reconstruct and clean these recovered telnet sessions: extract_telnet_sessions.py.