DataSoft / Honeyd

virtual honeypots
GNU General Public License v2.0
348 stars 101 forks source link

ARP replies to malformed requests allow fingerprinting honeyd with the arp-scan/arp-fingerprint tool #43

Closed PherricOxide closed 11 years ago

PherricOxide commented 11 years ago

Honeyd can easily be detected at the moment with ARP fingerprinting. The arp-scan package in Ubuntu contains a tool called arp-fingerprint, which is a Perl script that uses arp-scan to generate illegal ARP requests.

I'm not sure if it's worth trying to tie ARP fingerprinting into the templates, because most of the fingerprint fields rely on incorrect implementations and bugs, so it's terribly inaccurate on normal Linux and Windows machines (they just get lumped into a fingerprint like "Linux 2.2, 2.4, 2.6, Vista, 2008, Windows7" fingerprint). I think just fixing the invalid replies that make it stand out in the fingerprint would be sufficient.

Things to fix to make it match the "normal" fingerprint mentioned above,

PherricOxide commented 11 years ago

Fixed in 81b0204a345a1e5f4610da1730a1501c0cd8d793

Arp-fingerprinting now matches,

$ sudo arp-fingerprint 192.168.10.103
192.168.10.103  01010100000 Linux 2.2, 2.4, 2.6, Vista

Which is a far more common fingerprint than the old one of,

 192.168.10.103 11110111111 PIX OS 6.0, 6.1, 6.2, ScreenOS 5.0 (transparent)