LinuxQuestions.org
Help answer threads with 0 replies.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 11-22-2007, 05:03 AM   #1
aus9
LQ 5k Club
 
Registered: Oct 2003
Location: Western Australia
Distribution: Icewm
Posts: 5,842

Rep: Reputation: Disabled
feedback on idea of an Entrapment file


Hi

The idea, independent of any intrusion detection system, meaning, it is not added to your policy file, is to create a file in your home folder eg Mybank.txt and file contains false details.

2) depending on your /etc/fstab, the idea would be that you look to see if it had been read - atime changed.

Or you run tw against that file which only takes a second. And cull your root bash history manually or with a script.

Hopefully the intruder will spot the file and read it. Thus alerting you to atime change.

Any feedback or better ideas will be greatly appreciated.I am reasonably thick skinned so be as free with your ideas as you like.

The entrapment acts like a honeypot idea, sucking the intruder into thinking they are getting free confidential information. It does not involve any key loggers so can be used by ordinary home users.
 
Old 11-22-2007, 05:16 AM   #2
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Sounds pretty cool to me. I mean, if the attacker takes the bait, you'll know you've got at least a user-level breach. So you might get a heads-up before the box is rooted, which is a good thing. Of course, the more public discussion there is about this tactic, the less likely it is to work - specially if the attacker is after your CPU/bandwidth and not your information. It's a nifty idea IMHO - you lose nothing you wouldn't have lost without it if it doesn't work. Just my

Last edited by win32sux; 11-22-2007 at 05:19 AM.
 
Old 11-22-2007, 06:16 AM   #3
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
You wouldn't want to call it an entrapment file since entrapment is illegal (atleast in the US). Enticement file would be better. However, someone already thought of doing this and it's commonly called a "honeytoken". But yeah it's a good idea.

Last edited by OlRoy; 11-22-2007 at 06:18 AM.
 
Old 11-22-2007, 06:28 AM   #4
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
AFAIK for it to be entrapment aus9 would have to be an officer of the law, and the attacker would need to show that the objective of aus9's tactic was to have the attacker do something which he normally would have never done. It would be pretty hard IMHO for the attacker to use an "I would have never looked at the file if he hadn't..." defense when we already know he is poking around the victim's home folder. So yeah, I agree with you that the name entrapment is a bad idea for this. I googled honeytoken and here is the Wikipedia page for it (just trying to save anyone a few keystrokes and a mouse click or two).

Last edited by win32sux; 11-22-2007 at 06:40 AM.
 
Old 11-22-2007, 06:50 AM   #5
jschiwal
LQ Guru
 
Registered: Aug 2001
Location: Fargo, ND
Distribution: SuSE AMD64
Posts: 15,733

Rep: Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682Reputation: 682
And when the hacker simply touches the file to set the access time back? Although some hackers aren't clever but the name of the file seems a bit obvious, althought I realize that was just an example.

If background service checks or resets the permissions of the file, that may change the access time, or if updatedb or kerry beagle indexes it you may erroneously think you have been hacked.

How about a file called addresses that looks like it may be a short little black book with your girlfriends address in them. But when the hacker calls the number expectiong your girlfriend they get the CIA or FBI. Or maybe to the Iranian embassy. Then the FBI & CIA will have their number, and watch them try to get off the

Last edited by jschiwal; 11-22-2007 at 07:02 AM.
 
Old 11-22-2007, 06:57 AM   #6
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
LMAO!!!

So what could we set Tripwire to check the file for in a case like this?


EDIT: Well, I went ahead and created a "top-secret.txt" file in my home directory and ran it through Tripwire (set to check all attributes) both before and after having dumped its contents with cat. The only attribute which Tripwire reports as having changed is access time. So I guess there really isn't any other attribute which would be useful in cases like this. Oh, and in case anyone is wondering, as mentioned by jschiwal, it was easy to fool Tripwire by changing the access time after having accessed the file. That said, you still don't lose anything by leaving this bait out there, as it's quite possible the attacker won't set the access time back (or back in time before the next Tripwire run).
Code:
win32sux@candystore:~$ ls -lu --time-style=full-iso top-secret.txt 
-rw-r--r-- 1 win32sux win32sux 4 2007-11-22 8:47:27.000000000 -0700 top-secret.txt
win32sux@candystore:~$ cat top-secret.txt 
This is the super-secret content of the file!
win32sux@candystore:~$ ls -lu --time-style=full-iso top-secret.txt
-rw-r--r-- 1 win32sux win32sux 4 2007-11-22 8:50:52.000000000 -0700 top-secret.txt
win32sux@candystore:~$ touch -a --date="2007-11-22 8:47:27.000000000 -0700" top-secret.txt
win32sux@candystore:~$ ls -lu --time-style=full-iso top-secret.txt
-rw-r--r-- 1 win32sux win32sux 4 2007-11-22 8:47:27.000000000 -0700 top-secret.txt
win32sux@candystore:~$

Last edited by win32sux; 11-22-2007 at 10:04 AM.
 
Old 11-22-2007, 05:27 PM   #7
aus9
LQ 5k Club
 
Registered: Oct 2003
Location: Western Australia
Distribution: Icewm
Posts: 5,842

Original Poster
Rep: Reputation: Disabled
this is great feedback

yes entrapment is a bad word, but it does catch more experts replying heh?

thanks OlRoy for the correct term honeytoken and thanks jschiwal for the heads up on atime cheating and win32sux for all his work.

2) but I do want to come back to the choice of filename as IMHO this is the key. You need to entice, honeytoke the intruder into viewing your file. So calling it something about money, sex, crime, security is what I am thinking you would choose.

to be crude ....mypornsites.txt....twpol.txt (in your home folder)

3) I realise with experts already thinking of what intruders may be thinking, that it would be obvious to the intruder, but it is meant to be bait to be taken. It has to be something that forces the intruder to say, yippee I will have a gander at this.

any feedback?
 
Old 11-22-2007, 05:46 PM   #8
OlRoy
Member
 
Registered: Dec 2002
Posts: 306

Rep: Reputation: 86
I would name it something to do with passwords. People have to remember a lot of passwords and it's not uncommon for them to write them down, and attackers would always be interested in furthering their compromise. Before this thread, when I thought of honeytokens, my first thought would to be have something like Snort monitoring traffic looking for a certain string of chracters. However, of course having both types of IDSs (NIDS and HIDS) looking for a honeytoken as well as using multiple honeytokens on your system is as you probably know, the best option.
 
Old 11-23-2007, 12:18 AM   #9
aus9
LQ 5k Club
 
Registered: Oct 2003
Location: Western Australia
Distribution: Icewm
Posts: 5,842

Original Poster
Rep: Reputation: Disabled
yes I agree passwords is a fine idea.

I have another idea, after generating a passphrase protected tw.pol file, modify your twpol.txt file and leave it on the hard drive to act as a honeytoken. You will of course have to update your database so no reports are future reported of the changed file.
 
Old 11-23-2007, 01:15 AM   #10
win32sux
LQ Guru
 
Registered: Jul 2003
Location: Los Angeles
Distribution: Ubuntu
Posts: 9,870

Rep: Reputation: 380Reputation: 380Reputation: 380Reputation: 380
Quote:
Originally Posted by aus9 View Post
I have another idea, after generating a passphrase protected tw.pol file, modify your twpol.txt file and leave it on the hard drive to act as a honeytoken.
That would eliminate the attacker's ability to reset the access time on the file (unless he's got root powers). Nice!
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
Good idea/bad idea: interface colors introuble General 5 10-30-2006 01:33 PM
LXer: Freespire: Great Idea? Awful Idea? LXer Syndicated Linux News 1 05-04-2006 06:10 AM
idea to hide encrypted file system on audio cd ? qwijibow Linux - Security 2 09-13-2004 08:53 PM
HELP! I have no idea what to do with a tar.gz file BajaNick Linux - Software 1 07-08-2003 08:31 PM
Interesting idea of file security hamster Linux - Software 5 06-09-2003 10:03 PM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 07:11 AM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration