TUM Logo

Sticky File Shares: Fingerprinting SMB-Honeypots on the Internet

Sticky File Shares: Fingerprinting SMB-Honeypots on the Internet

Supervisor(s): Fabian Franzen
Status: finished
Topic: Others
Author: Lion Steger
Submission: 2019-10-15
Type of Thesis: Bachelorthesis

Description

Distinguishing honeypots from real targets on the internet is an important
task for attackers who are trying not to give away the secret of their newest
exploits. In this thesis we look at the Server Message Block (SMB) file shar-
ing protocol and show how to distinguish honeypots from real servers with
minimal effort during the negotiation phase of the protocol. Furthermore,
we use these techniques to perform internet-wide scans and uncover hon-
eypots. We analyzed 8 different implementations of the protocol on small
implementation deviations and used them to establish unique fingerprints
for each implementation. In order to be able to measure the differences
between the implementations, we designed a similarity metric which we
used to categorize unknown responses and subsequently recognize those
originating from honeypots. During our scans we were able to discover
1 407 518 SMB hosts of which 2 321 were honeypots. We conclude that it is
feasible to distinguish honeypots from real servers.