当前位置:网站首页>Honeypot attack and defense drill landing application scheme
Honeypot attack and defense drill landing application scheme
2022-07-02 08:30:00 【Chengdu knows Chuangyu】
2022 The actual combat drill of the year of attack and defense is imminent , Honey pot presents a copy for you in preparation for the war “ hardcore ” Sharing of landing application solutions , Help you clear your mind , Efficient “ Prepare for war ”.
Next , It will be combined with years of experience in network attack and defense , Summarize the attack path with the highest frequency launched by the attacker in the attack and defense drill scenario , For these potential problems , Formulate corresponding active defense strategies one by one , Respond effectively .
For information collection
Path analysis : Attackers usually take advantage of Information disclosure platform Such as GitHub、 Code cloud 、 Baidu SkyDrive 、 Internet portals such as cyberspace search engines , And try Use information to mine vulnerabilities .
Coping strategies :
1、 Build traps : By constructing Sensitive words 、 Non critical source code 、 System profile Such information honeypot system as a trap to attract attackers to visit .
2、 Drop bait : When delivering bait information , Consider using the browser ID The probability of success in traceability is higher , More bait can be delivered to the relevant information sharing platform .
Plant points for the system
Path analysis : The attacker obtains the target asset information or account information through information collection , Will choose to be familiar with the system Looking for weaknesses .
Coping strategies : Highly simulated key systems : Around the real business system simulation of the enterprise that the attacker focuses on during the attack and defense drill , The offline historical business system can be re launched into the honeypot system , Induce the attacker to stay .
Simulate customized high simulation scenarios : These domain name websites are maintained manually, such as adding interactive pages 、 Regularly publish group announcement information 、 Regular background login and management Build high simulation scenarios .
For intranet horizontal attacks
Path analysis : The attacker is supposed to pass 0day You can enter the intranet by other means , Due to the acquisition of The corresponding score of the defender's path is great , Path layout 、 Intranet horizontal attack is often a necessary attack process in attack and defense drills .
Coping strategies :
1、 Timely attack perception : Intranet Deploy as many perceptual honeypots as possible , It can be done by trunk The way to idle IP binding , To cover all areas of the intranet for attack awareness .
2、 Key points deploy honeypots : To prevent attackers from directly touching the real host or operation and maintenance terminal through the host access log , Some open ports on the host at the key node should be bound to the honeypot .
Sensitive information induces attacks : Can forge login domain credentials 、RDP Connection record 、 Operation and maintenance log 、 User folders 、 Browser browsing records and related sensitive information content to tempt attackers to attack .
For real-time attacks
Attack analysis : Attackers launch real-time attacks , The defender needs to block the attack 、 Record attack information 、 Analyze the attack path 、 Trace competitor information . These are not just data information that can be competent , It must rely on the attack perception of its own products 、 Ability to record , It also needs to expand its collaborative defense capabilities with security products 、 Combined with the traceability of security big data 、 Character portrait ability .
Coping strategies : Attack redirection
Network attack detection : Honeypot monitors whether the network environment has attack traffic in real time .
Attack stream redirection : The redirection of attack flow is introduced into the deployment of honeypot system , Realize the security isolation between attack activities and customer network environment , Ensure the security of customers' network environment .
Attack analysis
Applied analysis : Master the attack information of the attacker , And attack tools for attackers 、 route 、 After further analysis of intention, we can find our own system and defense vulnerabilities , Targeted leak detection and filling .
Coping strategies : Vulnerability simulation
Simulation scenario upgrade : Based on the largest and richest vulnerability knowledge base in China Seebug, Pass regularly POC Upgrade the simulation scene in the honeypot device .
Simulation vulnerability settings : Honeypot system can be injected with newer vulnerabilities 、 Simulation scenarios tailored to business services and application requirements , Lure the intruder to detect the honeypot and extend the residence time , Accurately capture high-risk hacker attacks , Protect customers' business systems .
Trace the source of the attack
Applied analysis : The biggest advantage of honeypot application in attack and defense drill scenarios is to take attack as defense , Traceability score .
Coping strategies : Attack real-time forensics
Get virtual identity : Obtain attack behavior data for classification and traceability , Realize deep traceability and reverse osmosis , Attackers including social media identities can be obtained IP、IM communication tools ID Wait for more personal information .
Related threat intelligence : Attackers often use VPN/ Proxy and other means to initiate access requests , Honeypot can obtain the attacker's truth through its integrated rich traceability plug-ins IP. Honeypot against every attack source IP Will create a unique fingerprint for marking , Even if the attacker tampers IP The attack behavior can also be analyzed through the effective correlation of fingerprints , And synchronize the information obtained at this stage to the safe brain 、 Tencent Threat Intelligence and other big data platforms , Build an accurate 、 Comprehensive Threat Intelligence .
Practical deployment skills
1、 Subregional deployment
Honeypots provide Locally aware honeypot and Cloud trap honeypot Two regional deployment methods , At the same time, it supports combined use .
Locally aware honeypot : Deployed in the enterprise intranet area and the core exchange area , Perceive and discover the attacker , And kick it out of the intranet area as soon as possible .
Cloud trap honeypot : Deployed in the public cloud area hosting the enterprise business system , By trapping honeypots 、 Collect attacker information by delivering bait and other means , Effectively track and trace the attacker , And real-time monitoring of Extranet domain name detection and scanning operations .
2、 System simulation application
Deploy the honeypot simulation system around the business application system that the attacker focuses on during the attack and defense drill and the real business system of the enterprise .

3、 Network environment requirements
Honeypot management website opens the designated port , For administrators SSH Log in to the system for management 、 Page access uses 、 Probe and one-way encrypted channel of Management Center .

Honeypot probe : To ensure better perception , It is recommended not to restrict the port of the probe website .
4、 Deploy and implement the overall process

5、“ Sweetness ” Add plans
Honeypot in order to improve the construction of protective capacity 、 Control in advance , Achieve the purpose of making the honeypot more highly simulated and tempting attackers , Yes, honey pot “ Sweetness ” Relevant plans have been formulated .

Offensive and defensive confrontation itself is an asymmetric technological game , Blindly carry out passive defense , Even if the defense measures are continuously improved , It often only increases resource input and cost , It doesn't have a better effect , Instead, it always bears the risk of system and information being destroyed and stolen .
Honeypot landing application scheme for pure dry goods , You can contact Xiaobian to get ~
边栏推荐
- Intelligent manufacturing solutions digital twin smart factory
- Get the width and height of the screen in real time (adaptive)
- STL速查手册
- HCIA—應用層
- OpenCV 6.4 中值滤波器的使用
- 方法递归(斐波那契数列,青蛙跳台阶,汉诺塔问题)
- My VIM profile
- Carsim problem failed to start Solver: Path Id Obj (X) was set to y; Aucune valeur de correction de xxxxx?
- sqli-labs第8关(布尔盲注)
- How to uninstall SQL Server cleanly
猜你喜欢

Carsim-实时仿真的动画同步问题

HCIA—應用層

St-link connection error invalid ROM table of STM32 difficult and miscellaneous diseases

Don't know mock test yet? An article to familiarize you with mock

Jumping | Blue Bridge Cup

2022 Heilongjiang's latest eight member (Safety Officer) simulated test question bank and answers

web安全--逻辑越权

File upload Labs

Principes fondamentaux de la théorie musicale (brève introduction)

Rotating linked list (illustration)
随机推荐
Gateway 简单使用
使用wireshark抓取Tcp三次握手
Principes fondamentaux de la théorie musicale (brève introduction)
Use Wireshark to grab TCP three handshakes
c语言自定义类型——结构体,位段(匿名结构体,结构体的自引用,结构体的内存对齐)
In depth understanding of prototype drawings
Installation and use of simple packaging tools
Global and Chinese market of tillage finishing machines 2022-2028: Research Report on technology, participants, trends, market size and share
My VIM profile
c语言将字符串中的空格替换成%20
Use of OpenCV 6.4 median filter
16: 00 interview, came out at 16:08, the question is really too
Common shortcut keys of Jupiter notebook (you can also view it by pressing h in command mode)
Don't know mock test yet? An article to familiarize you with mock
What are the platforms for selling green label domain names? What is the green label domain name like?
idea中注释代码取消代码的快捷键
Jz-061-serialized binary tree
樂理基礎(簡述)
HCIA—应用层
Force buckle method summary: sliding window