May 2, 2015
Jason Trost

MHN += Splunk: Announcing the Modern Honey Network Splunk Application

<p>During our presentation on "Lessons Learned from Building and Running MHN, the World&#39;s Largest Crowd-sourced Honeynet" at the <a href="" target="_blank">BSidesSF 2015</a> conference we released a free and open source (LGPL) Modern Honey Network application for Splunk. The application is available for download from Splunkbase <a href="" target="_blank">here</a> and the code is available on Github <a href="" target="_blank">here</a>. Here is a link to a <a href="">recording of the talk</a> and the <a href="" target="_blank">slides</a>. Modern Honey Network is a free and open source (LGPL) platform for deploying and managing honeypots and leveraging their data.</p><p><a href=""><img border="1" src="" /></a></p><p>The MHN Splunk app allows MHN users to deploy honeypots and then search, explore, analyze, and alert on events from honeypots using their Splunk instance. All page show the last 24 hours of data by default, but this can be changed by selecting a larger date range from time window drop down. Below are some screenshots of some of the dashboards this application includes.</p><p><b>Overview Dashboard</b>: this is the home screen of the MHN Splunk app. It shows a high level summary statistics about all of your honeypots including:</p><ul><li>Number of Attacks</li><li>Unique Attacker IPs</li><li>Unique MD5s collected</li><li>Unique URLs collected</li><li>Number of commands executed</li><li>Attacks per hour</li><li>Global Distribution of attack sources</li><li>And many more</li></ul><p><img border="1" src="" /></p><p><b>Kippo Analytics:</b> this page shows all the relevant data collected by <a href="" target="_blank">Kippo</a> honeypots. Kippo is an SSH honeypot that allows attackers to successfully "login" and gain a command shell on an emulated linux system. It allows defenders to capture the commands the attacker uses during their post compromise activities. This can be very useful for getting copies of their tools and locating their distribution sites for malware. This dashboard includes top usernames, passwords, username/password combos, and top commands executed.</p><p><img border="1" src="" /></p><p><b>p0f Analytics:</b> this page show all the data collected when performing passive OS fingerprinting using <a href="" target="_blank">p0f</a>. This allows defenders to sometimes glean the operating system, connection type, application name, uptime, and other features about hosts that are actively probing or interacting with your honeypot systems.</p><p><img border="1" src="" /></p><p><b>Conpot Analytics:</b> this dashboard displays all the event data collected from <a href="" target="_blank">Conpot</a>, an industrial control systems (ICS) honeypot.</p><p><img border="1" src="" /></p><p><b>Shockpot Analytics:</b> this dashboard displays all the event data collected from <a href="" target="_blank">Shockpot</a>. Shockpot is a web application honeypot designed to mimic an application that is vulnerable <a href="" target="_blank">ShellShock vulnerability</a> and capture HTTP payloads used during exploitation.</p><p><img border="1" src="" /></p><p><b>Dionaea Analytics:</b> this dashboard displays all the event data collected from <a href="" target="_blank">Dionaea</a>. Dionaea is a very extensible honeypot that emulates many different services including: SMB, http, ftp, tftp, MSSQL, MySQL, SIP, and SDP. It excels at capturing payloads and malware, especially around Windows exploitation attempts.</p><p><img border="1" src="" /></p><p><b>Snort/Suricata Analytics:</b> this dashboard displays all the event data collected from <a href="" target="_blank">Snort</a> or <a href="" target="_blank">Suricata</a>. Snort and Suricata are not honeypots, but they are incredibly useful when deployed alongside honeypots for providing added context around what specific vulnerabilities are being exploited.</p><p><img border="1" src="" /></p><p>We will continue building out this Splunk application for the other honeypots supported by MHN (<a href="" target="_blank">Wordpot</a>, <a href="" target="_blank">ElasticHoney</a>, <a href="" target="_blank">Glastopf</a>, and <a href="" target="_blank">Amun</a>) and as new honeypots are added to the MHN platform. This project is open source (LGPL) and we encourage anyone interested to checkout the project out from <a href="" target="_blank">Github</a> and give us feedback on how to make it better (or pull requests with new features).</p><p>If this sort of work interests you, ThreatStream is <a href="">hiring both researchers and engineers</a> and if you want to be protected from threats like this, <a href="">sign up to try ThreatStream Optic</a>. Lastly, if you are getting benefit from honeypots we would highly recommend <a href="" target="_blank">donating</a> to the <a href="" target="_blank">Honeynet Project</a>, an international 501c3 non-profit security research organization, dedicated to investigating the latest attacks and developing open source security tools to improve Internet security.</p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.