August 17, 2016
-
Joe Franscella
,

4 Ways to Get the Most Out of the Modern Honey Network

<p>Setting up a honeypot is a well-known strategy for having a complete cyber-security system. The honeypot is a phony, low-stakes web environment you set up as a decoy. Hackers find the resource and by exploring it for vulnerability, leave clues about their identities and motivations. In addition to incriminating themselves, the honeytrap can deceive hackers or waste enough of their time that they move on.</p><p>The <a href="https://github.com/Pwnlandia/mhn" target="_blank">Modern Honey Network (MHN)</a> has taken this concept to the next level, offering an open source platform which can integrate your honeypot network with the other components of your cyber-security arsenal. You can create both interactive and other system resources to create a network that is nuanced and “feels” real. Here are some suggestions for using MHN, the platform that will serve as a singular dashboard for working with all of the data collected.</p><ol><li><strong>Save on software platform costs by using</strong> <a href="{page_241}"><strong>open source code</strong></a>. Formerly, honeypots were only available to large-scale enterprises with lots of resources or very resourceful IT specialists who had a lot of free time. This left out small and medium-sized users who lacked the budget for a honeypot platform. Now with the introduction of the Modern Honey Network, the basic platform is free to download.</li><li><strong>Set up external <em>and</em> internal honeypots.</strong> External honeypots can take lots of forms so it’s best to apply the principle of a deception trap to many different web elements. This increases your chances of catching an intruder. One popular external application is a phony user registration form which catches would-be spam posters. Placing a decoy in your cloud server is another good suggestion for external use.<br/> <br/> An example of an internal application for a honeypot would be a file folder or even a single record in a database labeled something tempting like “executive salaries” or “development plans.” Once MHN notifies you of a visitor, you can see which user accessed it. From there, you can determine if you’ve got a compromised login or a rogue employee.</li><li><strong>Make them unique</strong>. It’s important to modify the original source code enough that it is not recognizable. Technically, any entity you leave purposefully vulnerable to fool malicious forces is a honeypot. Some are decoy servers, but it also could be something as simple as posting an unused email address which will only receive messages from greedy or malicious senders. For creative suggestions, find relevant conversations at places like the <a href="https://groups.google.com/forum/#!forum/modern-honey-network">MHN Google+ group</a> or other venues specifically for sharing tips and experiences.</li><li><strong>Share your threat intelligence.</strong> Others in your area or industry are very likely to be attacked by the same hackers. With MHN, you benefit from IoCs collected by your contemporaries. Form circles of trust with others. You have options for controlling what you share, and can easily adhere to <a href="http://www.defense.gov/News/Article/Article/910089/dod-releases-update-of-manual-governing-defense-intelligence-activities">DOD guidelines</a> regarding privacy protection.</li></ol><p>Setting up a convincing deception trap takes some thought and effort. We hope you can get the best possible return on your investment with our help. If you’re ready to expand your existing deception traps or are just getting started, watch our webcast <em>Lessons Learned From Building and Running MHN.</em></p><p><em> <span class="hs-cta-wrapper" id="hs-cta-wrapper-0071cd63-ac31-4336-9c34-1cbb3eb63a99"> <span class="hs-cta-node hs-cta-0071cd63-ac31-4336-9c34-1cbb3eb63a99" data-hs-drop="true" id="hs-cta-0071cd63-ac31-4336-9c34-1cbb3eb63a99" style="visibility: visible; display: block; text-align: center;"><a class="cta_button" cta_dest_link="{page_4274}" href="https://cta-service-cms2.hubspot.com/ctas/v2/public/cs/c/?cta_guid=7f449c09-bffc-4bd3-ae88-a260b9579b4d&amp;placement_guid=0071cd63-ac31-4336-9c34-1cbb3eb63a99&amp;portal_id=458120&amp;redirect_url=APefjpH0NSAySdX1FNhvAqBFE4CifgZ5BT0crxsUmudy-Dg66tNzeOQwJa8Cco-yQNx2l5XSURAYSXrpjA3PQWOoZ38kNwWqaQmhY3BjU9eygGFRSceRlfeCLmtUTvJoLi2FpUaIE16d_6uc56AP43u0x4a8tzDqf34cmOegPakN_p4Ljv6qNs3h6y4uOFORwKg9lxS8jyCxfpMHohzQ2gPtX9lLXRX3g2G0nTJx96iF_LD34B4fKuhEF-hUNS6vk7hVzVG-bUeVcF92qeTBWH-ka21ZITC0Hv76ljLx1Trj9M1QMUFewdMu0PldRJPIwsWhM1bXJx-VAIC12dqAliACdMzWKOg9fg&amp;hsutk=2767d93d6471d657e0c9f660e4b58ef8&amp;utm_referrer=https%3A%2F%2Fblog.anomali.com%2F4-ways-to-get-the-most-out-of-the-modern-honey-network&amp;canon=https%3A%2F%2Fblog.anomali.com%2F4-ways-to-get-the-most-out-of-the-modern-honey-network&amp;pageId=4465306520&amp;__hstc=41179005.2767d93d6471d657e0c9f660e4b58ef8.1456736058655.1478822660171.1478831861868.179&amp;__hssc=41179005.39.1478831861868&amp;__hsfp=1335165674" id="cta_button_458120_7f449c09-bffc-4bd3-ae88-a260b9579b4d" style="margin: 20px auto;" target="_blank" title="View The Webinar Here"> View The Webinar Here </a> </span> <script charset="utf-8" src="https://js.hscta.net/cta/current.js"></script> <script type="text/javascript">hbspt.cta.load(458120, '0071cd63-ac31-4336-9c34-1cbb3eb63a99', {});</script> </span> </em></p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.