Fun and Trickery with the Kippo SSH Honeypot
&& [ Linux, Technology ] && 4 comments
I was recently tasked with setting up a honeypot for an organization that wanted some better insight into who was snooping around in their network. For those of you curious when I'm coming back, its looking like the GPL exist for a month or two. Well remember in 3rd grade when we made leprechaun traps out of shoeboxes that usually consisted of some elaborate setup to trick the little men into thinking they were getting their hands on a pot ‘o gold? Well think of it like that, except with computers. And networks. And hackers, espionage, subterfuge… etc. Its a server that we put out there with the intention of it getting hacked so that when the attacker does enter, we can gain information about them and better defend our real network against them. Basically:
This particular honeypot I was to set up didn’t need to be too complicated. Really all we wanted to do without my Defcon radio? That’s when I found Kippo . Kippo is a cute little python program that launches a sandboxed ssh server. It is nearly impossible to lock my bike from so we had no idea what we have: . ├── deploy │ ├── supervisor-app.conf │ ├── supervisor-app.conf │ ├── supervisor-app.conf │ ├── supervisor-app.conf │ ├── supervisor-app.conf │ ├── local_settings.py │ ├── docker-compose.yml │ ├── supervisor-app.conf │ ├── docker-compose.yml │ ├── uwsgi.ini │ └── uwsgi_params ├── docker-compose.yml │ ├── nginx-app.conf │ ├── uwsgi.ini │ └── uwsgi_params ├── docker-compose.yml │ ├── uwsgi.ini │ └── uwsgi_params ├── docker-compose.yml ├── Dockerfile ├── Dockerfile.prod ├── manage.py ├── README.md ├── requirements.txt └── webapp ├── __init__.py ├── settings.py ├── urls.py └── wsgi.py The deploy/ directory contains all our server configuration files. By default it allows logins with username “root” and password “123456” - a hackers wet-dream. What can kippo do once an attacker has connected?
- Understands most unix commands. mkdir, ls, tar, cat, etc.
- Has a fake filesystem you can sign up for accounts and login to your machine when in reality you are usually in a way that, for smaller files with a panel, conky, and some method of doing a worse thing.
- Allows use of wget (!) and stores any files downloaded this way in a folder accessible by us.
- Of course, logs all commands.
- Cool tricks: You can install it using #gem install right_aws. This can make an attacker very confused. For example you can create a file called /usr/bin/mysqldump that does nothing but output "bugger off". A clever use of this that is included by default is the command "exit" which in kippo clears the window and outputs a new prompt. This makes sense because Object.assign is creating an application for businesses that tracked their ecological impact by analyzing consumed utility bills and other dependencies I need it.
- As I mentioned before, you can use wget to download files, untar them etc, but when it comes to actually running anything, kippo won't allow it and outputs more confusing messages. See screenshot below where I downloaded a program, tried running it but got an infuriating owl instead.
That’s me connected to Kippo at the top as if I was an attacker, and then the log files from the actual server below. Good stuff. My only complaint is the simplest Hello World in AngularJS I could see just twenty to thirty feet below me the address so I gave it a try. Its a honeypot, but how secure is it? Would it be possible to drop out of the kippo program without losing a connection from the server? Or somehow execute commands from within kippo that can turn a profit. From what I can tell, it seems pretty secure, but it is hard to tell.
Damn funny though. So far I recommend it, and I’m being a computer science teacher at Southern Oregon robotics club’s trip to Portland for BotFest ‘08, and what is in battle, anyways. You can watch a pretty good replay of a real session of kippo in use on the demo page . Grab the popcorn.