Hack Like a Pro: Capturing Zero-Day Exploits in the Wild with a Dionaea Honeypot, Part 2 (Configuration)

Capturing Zero-Day Exploits in the Wild with a Dionaea Honeypot, Part 2 (Configuration)

Hack Like a Pro: Capturing Zero-Day Exploits in the Wild with a Dionaea Honeypot, Part 2 (Configuration)

Welcome back, my rookie hackers!

The Golden Fleece of hackers is to develop a zero-day exploit, an exploit that has not been seen by antivirus (AV) software or and intrusion detection system (IDS). A zero-day exploit is capable of skating right past these defenses as they do not contain a signature or another way of detecting them.

Developing a zero-day can be tedious and time-consuming and is not for the novice. It usually involves finding a buffer that can be overflowed, then writing the code that overflows the buffer, and taking control of the execution so that your malicious software is run. Not a simple task.

An alternative, of course, is to capture a zero-day exploit. Criminal hackers and national governments are always developing new zero-day exploits in order steal credit card numbers, confidential information, or national secrets. If we can convince those entities that our system is both important and vulnerable, they will likely attack it as well. When they do, we may be able to capture their exploit and reuse it. Some of these exploits are worth millions of dollars.

In the first part of this series, we downloaded and set up the Dionaea honeypot. What makes Dionaea different than other honeypots is its ability to capture exploits.

We had set up the honeypot in the last guide, but we had yet to configure it. In this tutorial, we will configure Dionaea to prepare it for capturing exploits. I began this seres setting up Dionaea on an Ubuntu 14.04 desktop system, so we will continue to use Dionaea on Ubuntu—but Dionaea will run on many Linux distributions.

Step 1: Open the Dionaea Configuration File

The first step is to open the Dionaea configuration file. First navigate to the /etc/dionaea directory.

ubuntu > cd /etc/dionaea

When you do a long listing on that directory, you can see the dionaea.conf file. Let's open that file with a text editor. On Ubuntu, we have several choices. In this case, I used Leafpad, but gedit, Vim, or any other text editor will work.

ubuntu > leafpad dionaea.conf

Step 2: Configure Logging

In its default configuration, Dionaea will create shiploads of logs in a production environment. In some cases, you will see multiple gigabytes per day of log files. To prevent that, we need to configure logging to only log "error" priorities and above level. (For more information on Linux logging, see my Linux Basics article on the topic.)

To do so, we need to navigate down to the logging section of the configuration file. There you will see a section that looks like this:

Note the two areas I have circled. Change both of them from "warning,error" to just "error".

Step 3: Interface and IP Section

Next, navigate down to the listen and interface section of the configuration file. We want the interface to be set to "manual" and the IP addresses set to any. This will allow Dionaea to capture on the interface of your choice (eth0) no matter what IP address is assigned to it.

If you want Dionaea to only listen on a single IP address, you can place that IP address in the line below, replacing the "::" part.

addrs = {eth0 = "::"}

As you know, "::" is IPv6 shorthand for any IP address.

Step 4: Modules

Next, we need to tell Dionaea what modules we want it to run.

Leave the default setting here, but note that we have "virustotal" commented out. If the comments are removed, you can configure Dionaea to send any captured malware to VirusTotal. Let's keep it commented out.

Also note that we will be using one of our favorite tools, p0f, for the operating system fingerprinting. Lastly, we have "logsql" uncommented, enabling Dionaea to create and use an SQLite database. This will enhance our ability to manage the activity from our sensor by placing the data into a SQLite database.

Step 5: Services

Just below the modules, we have a section detailing the services we want to run. Note below that Dionaea by default is set up to run http, https, tftp, ftp, mirror, smb, epmap, sip, mssql, and mysql.

I recommend that you disable http and https as they are not likely to fool many attackers and may, in fact, identify it as a honeypot. Leave the others as they represent vulnerable services that may be attacked.

Step 6: Start Dionaea to Test

Finally, to test our new configuration we need to run Dionaea. We can do this by typing:

ubuntu> dionaea -u nobody -g nogroup -w /opt/dionaea -p /opt/dionaea/run/dionaea.pid

Now that Dionaea is running successfully, we can go to the next step, capturing and analyzing malware with Dionaea—so keep coming back, my rookie hackers!

Cover image via Shutterstock


Thanks OTW.

OTW, how to attract hackers? I mean some zero day exploits used by hackers must be used for specific aims,so how to let them believe this false aim? If someone use months for recon, a false aim is obviously.

I've found that Dionaea is really hard to detect as a honeypot.


But how to let them notice you? A system that not a part of valuable aim is not attractive to a hacker who has a zero day .

There are cyber criminals that scan the internet continuously for interesting targets, including ones who have zero days. If you make your honeypot look like an interesting target (like a banking server) by setting up certain services on certain ports and tweaking with domain names, someone will surely bite!


Yeah, but it's hard to achieve it. When a hacker find your ip is far from that bank, he won't hack it.

That's why I suggested "tamper with domain names".


Please tell, how to tamper with domain names?

Hello Phoenix 750! Please, can you tell me more and in detail how to make my honeypot look like an interesting target?

Could not have a cover image more apt.

Can anybody explain in detail what are the best uses to make your honeypot look as attractive as possible?

so where the next sstep??? "capturing and analyzing malware with Dionaea"


Share Your Thoughts

  • Hot
  • Latest