A honeypot is an asset designed to capture information about access and exploitation attempts. Honeypots are the most commonly used intruder trap in the security industry, as they have been traditionally used on the open Internet to capture public-facing attacker behavior.
In today's world, there is so much activity, scanning, and exploitation attempts on the open Internet that it takes a research team to make anything of all the data a public-facing honeypot can capture (for instance, see Rapid7's Project Heisenberg Cloud).
A Honey Pot is a virtual server that you can deploy on your network from InsightIDR. Honey pots looks like any other machine on the network, or they can be deployed to look like something an attacker could target. You can have a single honey pot, you can have multiple, and they are easy to deploy straight out of InsightIDR.
Honeypots lie in wait for "attacker" events to happen, such as a port scan or attempted user authentication, which immediately sets off an alarm. If you deploy the Rapid7 honeypot and enable the associated alerts in InsightIDR, you will be notified if such activity occurs. Once attackers find an initial foothold in a network, their next step is typically a network scan to identify all the other assets in the network.
InsightIDR's honeypot is an OVA appliance designed for deployment in VMware environments, and to detect network reconnaissance, typically in the form of suspicious network and/or port scanning.
The honeypot OVA contains an appliance that is a system listening on all ports.
Any scanning or connection attempts are allowed, capturing information about the source asset (and potentially user) associated with the connection. This data is immediately pushed up to the Insight platform, generating a Honey pot access alert.
Any connection to the honeypot will trigger an incident.
Limit user access to honey pots.
See System Requirements for specific information.
- From your InsightIDR homepage, select Data Collection on the left menu. Then, select Setup Honeypot in the top right corner and select Download Honeypot. The Honeypot OVA download will begin automatically.
- In your VMware environment, create a new Virtual Machine (VM) from the OVA. Power on the VM. You will see this prompt:
The following message is normal and can be ignored. If it appears, be patient and wait for the virtual machine to continue booting.
- Provide a name that fits your network naming convention and makes the machine look important. Be sure to use a fully qualified name, like core-dc.company.com. Otherwise, the honeypot will generate an error that it needs a FQDN.
- Follow the prompts to configure a dynamic or static IP, and/or web proxy for communication purposes.
- Continue until you see the following:
- Take note of the Agent key (xxxxxxxx-xxxx-xxxx-xxxxxxxxxxxx) that is displayed.
- Next, to activate the honeypot in the InsightIDR interface, navigate to Data Collection > Setup Honeypot > Activate Honeypot.
- Fill out the form and click Activate. The collector name is how the collector will be displayed in InsightIDR and does not need to match the actual name used to configure the honeypot. However, the Activate Key must match exactly.
Please note that a new activation key will be generated on the honeypot every time it is booted until you actually activate it.
- Once paired successfully, you will receive automated alerts to any connection attempts to the honeypot.
- After clicking Activate, you will see a loading page while the honeypot completes the activation process. This may take up to ten minutes to complete.
- When you see a “last active” message on the honeypot, the configuration process is complete.
If you have waited over ten minutes and activation still is not complete, something is wrong. Check the log file on the honeypot screen for errors.
You may have entered in the activation key incorrectly, so you may want to select Cancel Activation and try again.
Any access to the honeypot will cause an alert to trigger. A common way to test the honeypot is to run an nmap scan, mimicking intruder behavior.
You could run a standard discovery scan, a vulnerability scan, throw some exploits, or attempt to bruteforce the honeypot to trigger an incident. These are all common techniques during the reconnaissance and enumeration phase of the attacker’s kill chain.
Alternatively, you might use a tool like putty to attempt to access the honeypot.
After attempting to access the honeypot, wait a few minutes and then navigate to Investigations and verify that you received a Honeypot Access alert.