Building and evaluating high-interaction RDP honeypots
Building and evaluating high-interaction RDP honeypots
Supervisor(s): | Fabian Franzen |
Status: | finished |
Topic: | Others |
Author: | Kevin Schneider |
Submission: | 2021-08-16 |
Type of Thesis: | Bachelorthesis |
DescriptionHoneypots play an important role in internet security and intrusion detection and derive their benefits through their ability to blend in with genuine systems. With recent research showing significant deficiencies in existing open-source honeypot solutions for Microsoft's Remote Desktop Protocol in terms of detectability, the need for a new, more stealthy approach is apparent. We thus developed a novel approach that is not designed as a man-in-the-middle but implemented directly on the target system and compared it to two existing solutions by deploying multiple servers in the cloud and evaluating the captured data. To realize this new approach, we reversed relevant parts of Microsoft's Remote Desktop Services on an off-the-shelf Windows Server system and hooked relevant functions extracting information about running RDP sessions. 33 days and more than 2.8 million connection attempts later, the results indicate that only one honeypot separated itself from the other solutions by receiving 89% less traffic than the other honeypots. Our approach seemed to be on par with the remaining solution regarding the number of connections and attackers, which we attribute to the lack of interest or knowledge to detect the reference honeypot by a considerable share of the attackers. |