SlideShare a Scribd company logo
1 of 25
Download to read offline
BITNINJA.IO
HONEYPOTS, THEY ARE NOT JUST
FOR WINNIE THE POOH ANYMORE!
George Egri
B i t N i nj a.I O
WHAT IS A HONEYPOT?
Attract Catch
Analyze
B i t N i nj a.I O
REAL WORLD EXAMPLE
B i t N i nj a.I O
SERVER HONEYPOT DESIGNS
Low interaction High interaction
Server
FAKE DAEMON
Interaction measures the amount of activity an attacker can have with a honeypot
HONEYPOT VM
Server
B i t N i nj a.I O
TYPES OF ATTACK
Automatic Manual
B i t N i nj a.I O
ATTACK CYCLE
B i t N i nj a.I O
1. SCAN
1. Scan for vulnerable services
DIRECT DISTRIBUTED
B i t N i nj a.I O
> DIRECT SCAN
B i t N i nj a.I O
> DISTRIBUTED SCAN
B i t N i nj a.I O
> PORT HONEYPOT
B i t N i nj a.I O
1. SCAN
PROTECTION:
> PORT HONEYPOTS
> WEB HONEYPOTS
> LOG ANALYSIS
> DISTRIBUTED LOG ANALYSIS
B i t N i nj a.I O
2. EXPLOIT
 SQL injection
 Code injection
 Login after successful bruteforce
 Etc.
PROTECTION:
> WEB APPLICATION FIREWALL
> IP REPUTATION
B i t N i nj a.I O
3. INFECT
PROTECTION:
> WEB APPLICATION FIREWALL
> VIRUS/MALWARE DETECTION… BUT
THE ATTACKER IS ALREADY IN!
B i t N i nj a.I O
4. REGISTER COMMAND AND CONTROL
PROTECTION:
> IP REPUTATION (LISTED C&C SERVERS)
> OUTGOING TRAFFIC ANALYSIS (LIKE WAF)
B i t N i nj a.I O
4. REGISTER COMMAND AND CONTROL
B i t N i nj a.I O
5. POST EXPLOIT HACKING
PROTECTION:
> WAF
> OUTGOING TRAFFIC ANALYSIS
> INFORMATION HONEYPOT
ATTACKER
EXPLOITED
SERVER
FIREWALL
REAL TARGETSERVER
B i t N i nj a.I O
5. INFO HONEYPOT
Files on a server
 readable for everyone
 looks like a real mistake
 contains address and credentials for other systems
 watched for processes opening it
 honeypot trap for the actual usage of the credentials
/backup.sh
#!/bin/bash
IP = 10.3.11.74
USER = backuppc
PASSWORD = 453fwTfGSDwe
lftp -e "mirror -R /etc /backup/server/etc; exit" -u $USER, $PASSWORD $IP
B i t N i nj a.I O
6. RESOURCE USE
B i t N i nj a.I O
6. RESOURCE USE
PROTECTION:
> OUTGOING WAF
> OUTGOING SPAM FILTER
> OUTGOING DOS MITIGATION RULES
> IP REPUTATION (LISTED C&C SERVERS)
B i t N i nj a.I O
7. EXPAND
B i t N i nj a.I O
7. EXPAND
PROTECTION:
> OUTGOING WAF
> IP REPUTATION (LISTED C&C SERVERS)
B i t N i nj a.I O
B i t N i nj a.I O
HONEYNETS, HONEYFARMS
B i t N i nj a.I O
REACT
Block/Drop disadvantages:
- Can’t collect further info for analysis
- Timing based restriction is easy to automate
- Lack of false positive management
IP Greylisting by BitNinja advantages:
- Distribute IP reputation info to all your servers within
2 seconds (general IP reputation use 1,2,4 hour or daily
lists)
- Dramatically reduce false positives by different Captcha
modules
- Managed automatically
- Gain advantages of the infos of the worldwide bitninja
honeyfarm community (all users and bn honeypots)
Q & A
BITNINJA.IO
George Egri
george@bitninja.io
+1 805-628-4196
/zsoltegri
/bitninjaio

More Related Content

Viewers also liked

Finland presentationtests
Finland presentationtestsFinland presentationtests
Finland presentationtestsJannendoo
 
Vectoring basics & 1 element eric haut - pgn
Vectoring basics & 1 element   eric haut - pgnVectoring basics & 1 element   eric haut - pgn
Vectoring basics & 1 element eric haut - pgnGreg Fellin
 
China en la economãa mundial (1)
China en  la economãa  mundial (1)China en  la economãa  mundial (1)
China en la economãa mundial (1)Salome Hernandez
 
Animate Miami 2015 Program Guide
Animate Miami 2015 Program GuideAnimate Miami 2015 Program Guide
Animate Miami 2015 Program GuideSandy Martin
 
AIA-MBA Joint Committee Introduction
AIA-MBA Joint Committee IntroductionAIA-MBA Joint Committee Introduction
AIA-MBA Joint Committee IntroductionJon O'Brien
 
Jogos da memória
Jogos da memóriaJogos da memória
Jogos da memóriaAna Rocha
 
3 element eric haut - pgn
3 element   eric haut - pgn3 element   eric haut - pgn
3 element eric haut - pgnGreg Fellin
 
2 element eric haut - pgn
2 element   eric haut - pgn2 element   eric haut - pgn
2 element eric haut - pgnGreg Fellin
 
2 5 element eric haut - pgn
2 5 element   eric haut - pgn2 5 element   eric haut - pgn
2 5 element eric haut - pgnGreg Fellin
 
HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015
HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015
HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015Amjad Mehmood
 
140522 rovik ep mro_npf_distribution
140522 rovik ep mro_npf_distribution140522 rovik ep mro_npf_distribution
140522 rovik ep mro_npf_distributionKenneth Fossøy
 
Netflix viewing data architecture evolution - EBJUG Nov 2014
Netflix viewing data architecture evolution - EBJUG Nov 2014Netflix viewing data architecture evolution - EBJUG Nov 2014
Netflix viewing data architecture evolution - EBJUG Nov 2014Philip Fisher-Ogden
 
Sociedades complexas e o pluralismo temporal
Sociedades complexas e o pluralismo temporalSociedades complexas e o pluralismo temporal
Sociedades complexas e o pluralismo temporalAna Rocha
 

Viewers also liked (15)

Finland presentationtests
Finland presentationtestsFinland presentationtests
Finland presentationtests
 
Vectoring basics & 1 element eric haut - pgn
Vectoring basics & 1 element   eric haut - pgnVectoring basics & 1 element   eric haut - pgn
Vectoring basics & 1 element eric haut - pgn
 
China en la economãa mundial (1)
China en  la economãa  mundial (1)China en  la economãa  mundial (1)
China en la economãa mundial (1)
 
Animate Miami 2015 Program Guide
Animate Miami 2015 Program GuideAnimate Miami 2015 Program Guide
Animate Miami 2015 Program Guide
 
AIA-MBA Joint Committee Introduction
AIA-MBA Joint Committee IntroductionAIA-MBA Joint Committee Introduction
AIA-MBA Joint Committee Introduction
 
Jogos da memória
Jogos da memóriaJogos da memória
Jogos da memória
 
3 element eric haut - pgn
3 element   eric haut - pgn3 element   eric haut - pgn
3 element eric haut - pgn
 
2 element eric haut - pgn
2 element   eric haut - pgn2 element   eric haut - pgn
2 element eric haut - pgn
 
2 5 element eric haut - pgn
2 5 element   eric haut - pgn2 5 element   eric haut - pgn
2 5 element eric haut - pgn
 
HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015
HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015
HMC Taxila_Internship_Report_Amjad_Faizan_Mohsin_15_July_2015
 
140522 rovik ep mro_npf_distribution
140522 rovik ep mro_npf_distribution140522 rovik ep mro_npf_distribution
140522 rovik ep mro_npf_distribution
 
Makalah PPKN Bab Hukum
Makalah PPKN Bab HukumMakalah PPKN Bab Hukum
Makalah PPKN Bab Hukum
 
Hipotiroidismo
HipotiroidismoHipotiroidismo
Hipotiroidismo
 
Netflix viewing data architecture evolution - EBJUG Nov 2014
Netflix viewing data architecture evolution - EBJUG Nov 2014Netflix viewing data architecture evolution - EBJUG Nov 2014
Netflix viewing data architecture evolution - EBJUG Nov 2014
 
Sociedades complexas e o pluralismo temporal
Sociedades complexas e o pluralismo temporalSociedades complexas e o pluralismo temporal
Sociedades complexas e o pluralismo temporal
 

Similar to The Botnet Expansion Lifecycle

BitNinja's Honeypot System
BitNinja's Honeypot SystemBitNinja's Honeypot System
BitNinja's Honeypot SystemBitNinja
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to HoneypotsEmil Tan
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity George Boobyer
 
Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014Rob Fuller
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber worldNikhil Tripathi
 

Similar to The Botnet Expansion Lifecycle (6)

BitNinja's Honeypot System
BitNinja's Honeypot SystemBitNinja's Honeypot System
BitNinja's Honeypot System
 
Introduction to Honeypots
Introduction to HoneypotsIntroduction to Honeypots
Introduction to Honeypots
 
DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity DrupalCamp London 2017 - Web site insecurity
DrupalCamp London 2017 - Web site insecurity
 
Ip Spoofing
Ip SpoofingIp Spoofing
Ip Spoofing
 
Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014Attacker Ghost Stories - ShmooCon 2014
Attacker Ghost Stories - ShmooCon 2014
 
Attacks on the cyber world
Attacks on the cyber worldAttacks on the cyber world
Attacks on the cyber world
 

Recently uploaded

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsAndolasoft Inc
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...harshavardhanraghave
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️Delhi Call girls
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerThousandEyes
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Steffen Staab
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfkalichargn70th171
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfryanfarris8
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsArshad QA
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplatePresentation.STUDIO
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providermohitmore19
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...kalichargn70th171
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfproinshot.com
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...Health
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdfPearlKirahMaeRagusta1
 

Recently uploaded (20)

How To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.jsHow To Use Server-Side Rendering with Nuxt.js
How To Use Server-Side Rendering with Nuxt.js
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS LiveVip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
Vip Call Girls Noida ➡️ Delhi ➡️ 9999965857 No Advance 24HRS Live
 
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
Reassessing the Bedrock of Clinical Function Models: An Examination of Large ...
 
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
call girls in Vaishali (Ghaziabad) 🔝 >༒8448380779 🔝 genuine Escort Service 🔝✔️✔️
 
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected WorkerHow To Troubleshoot Collaboration Apps for the Modern Connected Worker
How To Troubleshoot Collaboration Apps for the Modern Connected Worker
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdfThe Ultimate Test Automation Guide_ Best Practices and Tips.pdf
The Ultimate Test Automation Guide_ Best Practices and Tips.pdf
 
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdfAzure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
Azure_Native_Qumulo_High_Performance_Compute_Benchmarks.pdf
 
Software Quality Assurance Interview Questions
Software Quality Assurance Interview QuestionsSoftware Quality Assurance Interview Questions
Software Quality Assurance Interview Questions
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
TECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service providerTECUNIQUE: Success Stories: IT Service provider
TECUNIQUE: Success Stories: IT Service provider
 
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
The Guide to Integrating Generative AI into Unified Continuous Testing Platfo...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Pushp Vihar (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Microsoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdfMicrosoft AI Transformation Partner Playbook.pdf
Microsoft AI Transformation Partner Playbook.pdf
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Exploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdfExploring the Best Video Editing App.pdf
Exploring the Best Video Editing App.pdf
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 

The Botnet Expansion Lifecycle

  • 1. BITNINJA.IO HONEYPOTS, THEY ARE NOT JUST FOR WINNIE THE POOH ANYMORE! George Egri
  • 2. B i t N i nj a.I O WHAT IS A HONEYPOT? Attract Catch Analyze
  • 3. B i t N i nj a.I O REAL WORLD EXAMPLE
  • 4. B i t N i nj a.I O SERVER HONEYPOT DESIGNS Low interaction High interaction Server FAKE DAEMON Interaction measures the amount of activity an attacker can have with a honeypot HONEYPOT VM Server
  • 5. B i t N i nj a.I O TYPES OF ATTACK Automatic Manual
  • 6. B i t N i nj a.I O ATTACK CYCLE
  • 7. B i t N i nj a.I O 1. SCAN 1. Scan for vulnerable services DIRECT DISTRIBUTED
  • 8. B i t N i nj a.I O > DIRECT SCAN
  • 9. B i t N i nj a.I O > DISTRIBUTED SCAN
  • 10. B i t N i nj a.I O > PORT HONEYPOT
  • 11. B i t N i nj a.I O 1. SCAN PROTECTION: > PORT HONEYPOTS > WEB HONEYPOTS > LOG ANALYSIS > DISTRIBUTED LOG ANALYSIS
  • 12. B i t N i nj a.I O 2. EXPLOIT  SQL injection  Code injection  Login after successful bruteforce  Etc. PROTECTION: > WEB APPLICATION FIREWALL > IP REPUTATION
  • 13. B i t N i nj a.I O 3. INFECT PROTECTION: > WEB APPLICATION FIREWALL > VIRUS/MALWARE DETECTION… BUT THE ATTACKER IS ALREADY IN!
  • 14. B i t N i nj a.I O 4. REGISTER COMMAND AND CONTROL PROTECTION: > IP REPUTATION (LISTED C&C SERVERS) > OUTGOING TRAFFIC ANALYSIS (LIKE WAF)
  • 15. B i t N i nj a.I O 4. REGISTER COMMAND AND CONTROL
  • 16. B i t N i nj a.I O 5. POST EXPLOIT HACKING PROTECTION: > WAF > OUTGOING TRAFFIC ANALYSIS > INFORMATION HONEYPOT ATTACKER EXPLOITED SERVER FIREWALL REAL TARGETSERVER
  • 17. B i t N i nj a.I O 5. INFO HONEYPOT Files on a server  readable for everyone  looks like a real mistake  contains address and credentials for other systems  watched for processes opening it  honeypot trap for the actual usage of the credentials /backup.sh #!/bin/bash IP = 10.3.11.74 USER = backuppc PASSWORD = 453fwTfGSDwe lftp -e "mirror -R /etc /backup/server/etc; exit" -u $USER, $PASSWORD $IP
  • 18. B i t N i nj a.I O 6. RESOURCE USE
  • 19. B i t N i nj a.I O 6. RESOURCE USE PROTECTION: > OUTGOING WAF > OUTGOING SPAM FILTER > OUTGOING DOS MITIGATION RULES > IP REPUTATION (LISTED C&C SERVERS)
  • 20. B i t N i nj a.I O 7. EXPAND
  • 21. B i t N i nj a.I O 7. EXPAND PROTECTION: > OUTGOING WAF > IP REPUTATION (LISTED C&C SERVERS)
  • 22. B i t N i nj a.I O
  • 23. B i t N i nj a.I O HONEYNETS, HONEYFARMS
  • 24. B i t N i nj a.I O REACT Block/Drop disadvantages: - Can’t collect further info for analysis - Timing based restriction is easy to automate - Lack of false positive management IP Greylisting by BitNinja advantages: - Distribute IP reputation info to all your servers within 2 seconds (general IP reputation use 1,2,4 hour or daily lists) - Dramatically reduce false positives by different Captcha modules - Managed automatically - Gain advantages of the infos of the worldwide bitninja honeyfarm community (all users and bn honeypots)
  • 25. Q & A BITNINJA.IO George Egri george@bitninja.io +1 805-628-4196 /zsoltegri /bitninjaio