Skip to main content

Table Of Contents

  • HONEY TECHNIQUES
    • WINDOWS
    • LINUX
    • NETCAT
    • PASSIVE DNS MONITORING

HONEY TECHNIQUES

WINDOWS

Honey Ports Windows:

  • Ref. http://securityweekly.com/wp­-content/uploads/2013/06/howtogetabetterpentest.pdf

  • Step 1: Create new TCP Firewall Block rule on anything connecting on port 3333:

    echo @echo off for /L %%i in (1,1,1) do @for /f "tokens=3" %%j in ('netstat -nao ^| find ^":3333^"') do@for /f "tokens=1 delims=:" %%k in ("%%j") do netsh advfirewall firewall add rulename="HONEY TOKEN RULE" dir=in remoteip=%%k localport=any protocol=TCP action=block >> <BATCH FILE NAME>.bat
  • Step 2: Run Batch Script

    <BATCH FILE NAME>.bat

Windows Honey Ports PowerShell Script:

Honey Hashes for Windows (Also for Detecting Mimikatz Use) :

  • Ref. https://isc.sans.edu/forums/diary/Detecting+Mimikatz+Use+On+Your+Network/19311/

  • Step 1: Create Fake Honey Hash. Note enter a fake password and keep command prompts open to keep password in memory

    runas /user:yourdomain.com\fakeadministratoraccount /netonly cmd.exe
  • Step 2: Query for Remote Access Attempts

    wevtutil qe System /q:"*[System[(EventID=20274)]]" /f:text /rd:true /c:1 /r:remotecomputername
  • Step 3: Query for Failed Login Attempts

    wevtutil qe Security /q:"*[System[(EventID=4624 or EventID=4625)]]" /f:text /rd:true /c:5 /r:remotecomputername
  • Step 4: (Optional) Run queries in infinite loop with 30s pause

    for /L %i in (1,0,2) do (Insert Step 2) & (Insert Step 3) & timeout 30

LINUX

Honey Ports Linux:

Linux Honey Ports Python Script:

Detect rogue scanning with Labrea Tarpit:

apt-get install labrea
labrea -z -s -o -b -v -i eth0 2>&1| tee -a log.txt

NETCAT

Use netcat to listen for scanning threats:

nc -v -k -l 80
nc -v -k -l 443
nc -v -k -l 3389

PASSIVE DNS MONITORING

Use dnstop to monitor DNS requests at any sniffer location:

apt-get update
apt-get install dnstop
dnstop -l 3 <INTERFACE NAME>
  • Step 1: Hit 2 key to show query names

Use dnstop to monitor DNS requests from a pcap file:

dnstop -l 3 <PCAP FILE NAME> | <OUTPUT FILE NAME>.txt