TUM Logo

Building and evaluating high-interaction RDP honeypots

Building and evaluating high-interaction RDP honeypots

Supervisor(s): Fabian Franzen
Status: finished
Topic: Others
Author: Kevin Schneider
Submission: 2021-08-16
Type of Thesis: Bachelorthesis

Description

Honeypots play an important role in internet security and
        intrusion detection and derive their benefits through their
        ability to blend in with genuine systems. With recent research
        showing significant deficiencies in existing open-source
        honeypot solutions for Microsoft's Remote Desktop Protocol in
        terms of detectability, the need for a new, more stealthy
        approach is apparent. We thus developed a novel approach that is
        not designed as a man-in-the-middle but implemented directly on
        the target system and compared it to two existing solutions by
        deploying multiple servers in the cloud and evaluating the
        captured data. To realize this new approach, we reversed
        relevant parts of Microsoft's Remote Desktop Services on an
        off-the-shelf Windows Server system and hooked relevant
        functions extracting information about running RDP sessions. 33
        days and more than 2.8 million connection attempts later, the
        results indicate that only one honeypot separated itself from
        the other solutions by receiving 89% less traffic than the other
        honeypots. Our approach seemed to be on par with the remaining
        solution regarding the number of connections and attackers,
        which we attribute to the lack of interest or knowledge to
        detect the reference honeypot by a considerable share of the
        attackers.