Honeypot Server Best Practices - From Mr. Robot to Reality

Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats.
A honeypot server works by creating an enticing target that looks valuable but contains no real business data. The key is making it accessible through common exploits and monitoring every access attempt. Curtis and Prasanna discuss real-world implementation strategies, from naming conventions to network placement, and explain why the honeypot only works if attackers don't know it exists. They also cover the critical importance of remote log storage for forensic analysis and how these systems can reveal attack patterns and entry points during incident response.
You found the backup wrap up your go-to podcast for all things
Speaker:backup recovery and cyber recovery.
Speaker:In this episode, we're gonna talk about the cybersecurity concept
Speaker:of a honeypot server through the lens of Mr. Robot episode or season
Speaker:one, episode seven and eight.
Speaker:We'll look at what makes one so effective, uh, how it can catch external hackers,
Speaker:as well as, uh, insider threats.
Speaker:Why?
Speaker:The key to success is that nobody knows that it exists.
Speaker:We also talk about proper log storage and why that's crucial for forensic analysis.
Speaker:That's gonna be important if the bad guys actually come knocking.
Speaker:By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.
Speaker:Backup, and I've been passionate about backup and recovery for over 30 years.
Speaker:Ever since.
Speaker:I had to tell my boss that there were no backups of the production
Speaker:database that we just lost.
Speaker:I don't want that to happen to you, and that's why I do this.
Speaker:On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.
Speaker:This is the backup wrap up.
Speaker:welcome to the show.
Speaker:Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who
Speaker:probably should just be taking me to the hospital instead of talking
Speaker:to me on a podcast recording.
Speaker:Prasanna Malaiyandi, how's it going?
Speaker:Prasanna,
Speaker:I am good Curtis, and I would love to take you to the hospital, but unfortunately
Speaker:by the time I get down there, uh, I don't think it would help your cause.
Speaker:you could probably be, I would be expired.
Speaker:well, hopefully not, but hopefully you'll just be better about that.
Speaker:Yeah, so hopefully this is short term, you know, short-lived.
Speaker:So for this, yeah,
Speaker:listeners
Speaker:yeah.
Speaker:This, this is, this is,
Speaker:know what?
Speaker:It's actually been a while since you've had an injury, knock on wood.
Speaker:But
Speaker:this count as an injury.
Speaker:I, I self-inflicted I think does count.
Speaker:So, all right, so I have this product, uh, you know, called Pure Cleanse.
Speaker:By the way, for those of you who watch us on YouTube, thank
Speaker:Yeah.
Speaker:who are
Speaker:Uh,
Speaker:you can watch our
Speaker:I, I'm,
Speaker:Faces on
Speaker:I, yeah.
Speaker:Uh, same, same name.
Speaker:Uh, so I'm holding up a, a, a cup that looks like it's full of pea.
Speaker:It is not full of pea.
Speaker:So it, it's a product used for like cleansing, like a room,
Speaker:Yeah.
Speaker:Especially of smells.
Speaker:Right.
Speaker:And, um.
Speaker:disinfectant, basically.
Speaker:an industrial.
Speaker:Yeah.
Speaker:And, and, um, but, but from an air perspective.
Speaker:So you drop a tablet, um, let me see here.
Speaker:Oh, this is, this is a, this is the way it comes.
Speaker:You get, you get this, you get this tablet, right?
Speaker:And you put, you fill water up to that, to the red line, and then you
Speaker:in.
Speaker:drop the tablet in, and then you leave the room.
Speaker:And it, it smells kind of like chlorine, but like really strong chlorine.
Speaker:And, um, and, and then you, and then once, once that's done
Speaker:and I
Speaker:and then you,
Speaker:is, uh, leave the room.
Speaker:yeah.
Speaker:Leave the room.
Speaker:Wow.
Speaker:Definitely still some.
Speaker:So I did that.
Speaker:I did all the stuff right and then.
Speaker:I went in and I took it out, and then I was showing it to, uh, my cleaning
Speaker:person and I was showing it to her.
Speaker:And then I was like, it smells kind of like chlorine.
Speaker:And I like popped the lid off and took a whiff and my nose was like
Speaker:literally this close, and I thought I was gonna have to go to the hospital
Speaker:yeah.
Speaker:not convinced that I shouldn't be in the hospital.
Speaker:Uh, my, my lungs, my, my airways closed up.
Speaker:Yeah.
Speaker:Yeah.
Speaker:And, uh, that was, that was not a good move.
Speaker:like you dummy, you're not supposed to be sniffing that stuff.
Speaker:Yeah,
Speaker:you.
Speaker:yeah, yeah.
Speaker:You, you're right.
Speaker:You're probably right.
Speaker:It was probably a, uh, yeah.
Speaker:And basically it was like, it was like I sniffed fire into my air pod, you
Speaker:know, into my air, long air airways.
Speaker:Yeah.
Speaker:It burned like a lot and it's still, and then like immediately, you know,
Speaker:my nose started running and I couldn't breathe and I, I, I thought I was
Speaker:gonna pass out, but luckily I did not.
Speaker:And, uh, it's now an hour later and I'm still
Speaker:Feeling it.
Speaker:yeah, I'm still feeling it.
Speaker:Um, yeah.
Speaker:you do need to take a break during the podcast and go see, seek
Speaker:medical attention, I think our listeners would totally understand.
Speaker:Um, I think, you know, just, uh,
Speaker:Yeah.
Speaker:good times, good times.
Speaker:Uh, so don't do that.
Speaker:Uh, I like the product.
Speaker:I like the product a lot, but, uh, don't, don't breathe it afterwards.
Speaker:Not, you know, something that's meant to be an industrial
Speaker:strength, like cleanse five.
Speaker:It's, it's supposed to cleanse 500 square feet.
Speaker:Then I just sniffed it like a maroon.
Speaker:Oh, Curtis, Curtis.
Speaker:Curtis, what are we going to do with you?
Speaker:Nothing, nothing.
Speaker:There's, it is just hopeless sometimes.
Speaker:Sometimes I just ask myself, you know?
Speaker:But, uh,
Speaker:But it has been a while though, since you've injured
Speaker:since I've done something really stupid.
Speaker:Yeah, yeah.
Speaker:Well, since I've,
Speaker:well, no, no.
Speaker:no.
Speaker:I, it's probably been 2, 3, 4 months.
Speaker:What was the last thing?
Speaker:What are you, what are you thinking of?
Speaker:Uh, remember when you, uh, were disinfecting a different room in your
Speaker:Oh
Speaker:uh, you decided to walk in while said
Speaker:yeah, I was, that was an ozone machine and um, for those of you that aren't
Speaker:familiar, so ozone is like oh two.
Speaker:Right.
Speaker:I think it's like two oxygen molecules and, um, I have a, again, an industrial
Speaker:strength ozone machine, and you know, when you have an ozone machine, you're
Speaker:not, you're not supposed to be in there.
Speaker:And I, I went in because like, I, I was just sorting out
Speaker:the, like, the timing part.
Speaker:And, uh, I went in there and, um.
Speaker:I was only in there maybe 30 seconds.
Speaker:And same thing like this, like I, I, I had to go, I had to go sit down
Speaker:for a while 'cause I couldn't breathe like my, again, my airway constricted.
Speaker:So I think maybe, uh, for future reference,
Speaker:Yeah.
Speaker:seems potentially dangerous, don't sniff it.
Speaker:Don't breathe it.
Speaker:Well, I, I held my breath when I went in the room.
Speaker:Right.
Speaker:I ne I, I was just in, in there to sort out the timer.
Speaker:I held my breath when I went in, but I was just in just a little bit too long
Speaker:and so I ended up having to inhale and I inhaled, uh, and it was not good.
Speaker:I'm just saying.
Speaker:Yeah.
Speaker:Yeah.
Speaker:yeah, so for those listeners, if Curtis sounds a little under the
Speaker:weather, that is why we wish him all a speedy recovery and hope he
Speaker:comes back to his normal self soon.
Speaker:Yeah.
Speaker:So, uh, this will be an interesting episode.
Speaker:We're gonna, we're we're gonna, we're gonna take two episodes, one episode
Speaker:of Mr. Robot in our continued series.
Speaker:Spoiler alert, we're gonna talk about all kinds of stuff.
Speaker:And our continued series on stuff that we can pick up from Mr. Robot.
Speaker:And the first episode, which is episode 1.6,
Speaker:Yeah.
Speaker:right?
Speaker:Uh, and then second episode 1.7, 1.6.
Speaker:Didn't have a whole lot in it from a cybersecurity perspective.
Speaker:It did have a whole lot in it from a crime perspective, but, but not from
Speaker:a cyber crime perspective so much.
Speaker:You wanna, you wanna summarize, uh, 1.6 or you want me to do it?
Speaker:Uh, I'll let you go ahead and do it.
Speaker:Okay.
Speaker:Right.
Speaker:So this,
Speaker:said, it was all like backstory, which
Speaker:yeah.
Speaker:the story, but not so much from a tech perspective.
Speaker:Yeah.
Speaker:So you may remember from the last episode, uh, it ended with Shayla's death.
Speaker:So Elliot's neighbor.
Speaker:Friend, uh, ended with her death.
Speaker:This episode opens with like a flashback of when, when he first met her.
Speaker:And, um, the, um, uh, and then we also see that Angela makes a deal with Terry
Speaker:Colby, the former CTO of evil corp, that she will testify that she broke
Speaker:the chain of custody with this DAT file.
Speaker:And why does that matter?
Speaker:It's because it renders it inadmissible in, uh, in court, right?
Speaker:And
Speaker:Uh,
Speaker:the
Speaker:yeah,
Speaker:like their smoking gun to say
Speaker:yeah, it's, yeah, exactly.
Speaker:And so he, he's gonna, um, she's gonna say that she broke chain
Speaker:of custody, which will then essentially let him off the hook.
Speaker:But in, in, uh, she, he, he's going to in, um, what, what would you call that?
Speaker:Um, what would you call that in exchange for him saying that he was
Speaker:there when they decided to poison, you know, her family essentially.
Speaker:Right.
Speaker:Um, then we start to see the beginnings of this meetings with this
Speaker:mysterious individual known as White Rose, the leader of the Dark Army.
Speaker:Right.
Speaker:We've, uh.
Speaker:and I think in.
Speaker:1.6. We don't actually know who white rose is.
Speaker:No, no.
Speaker:they've kind of talked about it before.
Speaker:It's like the person who leads a dark army, but like we have
Speaker:no idea who this person is and they just wanna set up a meeting.
Speaker:And do you wanna talk about why they wanna set up a meeting?
Speaker:I.
Speaker:Um, well this is, this is because they want to do, they want to
Speaker:be able to do attack all of the different, uh, steel mountain.
Speaker:Um.
Speaker:Data centers all at one time, and they need the dark army to be able to do that.
Speaker:Right?
Speaker:Yep.
Speaker:Yeah.
Speaker:Um, and then, um, you know, we get this, um, we get this, uh, this confession
Speaker:from Elliot to, to his therapist that like, you know, he's act everything
Speaker:and he's actually quite open with her, but in the process of opening
Speaker:with her, he scares a crap out of her.
Speaker:Like
Speaker:Um,
Speaker:Yeah,
Speaker:yeah.
Speaker:Yeah.
Speaker:Uh.
Speaker:says, I hacked you.
Speaker:I know everything about
Speaker:Yeah.
Speaker:don't take your medicines.
Speaker:I know all those things about you.
Speaker:Yeah.
Speaker:I know your, I know your,
Speaker:Deepest secrets.
Speaker:yeah.
Speaker:Your deepest secrets.
Speaker:Uh, yeah.
Speaker:And then, and then, uh, Tyrell, uh, does a little thing.
Speaker:Yeah, so Tyrell, if you remember from the last episode, he and his wife had gone
Speaker:and had dinner with Scott and Sharon and there's sort of that entire scene in the
Speaker:Yeah.
Speaker:of that.
Speaker:And
Speaker:Yeah.
Speaker:now it's actually where Scott gets officially announced as a CTO and
Speaker:they throw a shin dig at the office.
Speaker:once again, Tyrell is like, Hey, I'm gonna go meet up with Sharon.
Speaker:He is like, come up to the rooftop, I know what you want.
Speaker:And she shows up and uh, yeah.
Speaker:And then he basically kills her
Speaker:Yeah, he just strangles her.
Speaker:Uh, that was a, that was a sort of an unexpected, you think
Speaker:they're about to, you know,
Speaker:yeah.
Speaker:t wow.
Speaker:And then next thing you know, it's,
Speaker:Yeah.
Speaker:and, uh, that was not good.
Speaker:Yeah.
Speaker:Um, so if we forward to, uh, the next episode.
Speaker:Which is 1.7 AKA white rose.
Speaker:So you see Darlene stealing a gun, right?
Speaker:Because she's very worried about the fact that they're gonna meet
Speaker:white rose and she, you know, she's scared of, of whoever white rose is.
Speaker:Um, and then, um, we, we learned from, um.
Speaker:Gideon visits Tyrell, and sort of says, Hey, this is all the stuff
Speaker:that we've been doing on your behalf.
Speaker:And he mentions that there actually is a honeypot.
Speaker:We're gonna talk about that.
Speaker:That's sort of, I think they're gonna be the key thing we're
Speaker:gonna talk about in this episode.
Speaker:But, uh, uh, and, and nobody, nobody but nobody, but uh, uh, Gideon seems
Speaker:to want this honeypot to exist.
Speaker:Um, and then, um.
Speaker:The, we find out, uh, obviously there's this whole thing about, uh,
Speaker:sort of the, the subplot is Tyrell freaking out about the fact that people
Speaker:are looking into Sharon's murder.
Speaker:Uh, his wife finds out about Sharon's murder.
Speaker:Uh, but then we get, um, the whole big reveal about Mr. Robot.
Speaker:So there's been a lot of, up to this point, there's been a
Speaker:lot of people theorizing that Mr. Robot was all in his head.
Speaker:And it's still, I'm still a little confused because Mr. Robot is his
Speaker:father, and he's not, he's not old enough to be his father, so that
Speaker:means he's gotta be in his head.
Speaker:But that doesn't make any sense because we also have the scene of
Speaker:him meeting with, with, uh, Tyrell.
Speaker:Tyrell, and also he's talking to Darlene and all sorts of other things
Speaker:He's not old enough to be his father.
Speaker:Right.
Speaker:Well, eh, I think he's old enough to be his father at the point, because Elliot
Speaker:goes back right in this episode and he, so, because towards the end, right?
Speaker:Um, he goes and tries to kiss Darlene.
Speaker:Right.
Speaker:Oh yeah.
Speaker:Oh, I forgot about that.
Speaker:And Darlene is like, Elliot, do you not know who I am?
Speaker:Yeah.
Speaker:like, you're Darlene.
Speaker:And she's
Speaker:Yeah.
Speaker:am I?
Speaker:then he's like, oh, you're my sister.
Speaker:You're Princess Leia.
Speaker:yeah.
Speaker:And then he, and then he freaks out because he's like,
Speaker:uh, what all am I forgetting?
Speaker:And so if folks remember, he like would.
Speaker:Compromise someone then delete all the data.
Speaker:But before he did, he would burn it on a CD and keep the CD and name it with like
Speaker:different bands and things like that.
Speaker:Yeah.
Speaker:he goes back and looks and he finds a CD that's not labeled and he looks
Speaker:at it and he realizes it's his.
Speaker:And
Speaker:Yeah.
Speaker:looking at the pictures and he sees like a picture of Mr. Robot, right?
Speaker:And he sees pictures of his sister, Darlene and all the rest.
Speaker:And then he starts putting together.
Speaker:And then he's like, what is going on?
Speaker:And that's when the episode ends with Mr. Robot pounding on the
Speaker:door and saying, we need to talk
Speaker:we need to talk.
Speaker:It doesn't, I'm, I'm still confused.
Speaker:And that, that's because like he's basically the same age
Speaker:as a
Speaker:as, as the picture, so.
Speaker:Yeah.
Speaker:So I'm very, so, you know, because I'm, I'm all confused,
Speaker:but, uh, remind me who is Krista.
Speaker:Krista is the psychologist
Speaker:Oh, right, right, right.
Speaker:Okay.
Speaker:Um, okay.
Speaker:Uh,
Speaker:all right.
Speaker:yeah.
Speaker:And there's also, so one thing we didn't touch upon, and maybe we'll talk about
Speaker:it uh, maybe in a different episode, maybe in this episode, right, is one of
Speaker:the scenes is Cisco, who's the person who works for the Dark Army, right?
Speaker:Yeah.
Speaker:Ollie the cd.
Speaker:Right.
Speaker:Ollie and was like, Hey, I need you to do this for me.
Speaker:Yeah.
Speaker:And then there's this entire scene where Ali is basically in the middle of
Speaker:this attack that happens on All Safe,
Speaker:Right.
Speaker:He goes up to Elliot and is like, Hey, I need you to go drop these
Speaker:hard drives off at this place
Speaker:Yeah.
Speaker:And it was all the setup to, yeah.
Speaker:It was all a setup.
Speaker:And that is where he meets, uh, white Rose.
Speaker:Yeah, play.
Speaker:It's, you know what's funny is I knew BD Wong was in this episode
Speaker:because it was in the thing.
Speaker:And if it hadn't been for that, I'm not sure I would've recognized BD Wong.
Speaker:But, uh, 'cause he is, he's playing, uh, you know, a trans, uh,
Speaker:woman essentially in the episode.
Speaker:Uh, and, um.
Speaker:Uh, I, yeah, I'm not sure I would, I would've recognized him, but, um, so yeah.
Speaker:So we're, we're gonna come back to that.
Speaker:We're gonna, I think we're gonna do a separate episode on that aspect.
Speaker:But today I, I wanted to talk about this idea of a honeypot, which is a really
Speaker:cool idea that you can use, uh, and is frequently used in cybersecurity.
Speaker:And I first learned about the concept of a honeypot.
Speaker:When reading, um, a cuckoo egg,
Speaker:Yep.
Speaker:you read a cuckoo egg.
Speaker:Right.
Speaker:Um, and you wanna, you want to do a quick summary of a cuckoo
Speaker:egg for those who haven't read
Speaker:a Cuckoo's Egg is a nonfiction recount of Cliff Stoller, I think.
Speaker:Ital?
Speaker:Yeah.
Speaker:Right.
Speaker:who used to be, uh, employed at Berkeley, and he was managing computer
Speaker:infrastructure and he once noticed that a mainframe, like the timing
Speaker:would be off on the mainframe.
Speaker:he was like, who's using the resources?
Speaker:This is way back in the day when you shared CPUs and
Speaker:all the other things and you
Speaker:it was like a, it was like a three second difference between
Speaker:the two different time, um, yeah.
Speaker:Accounting system.
Speaker:he basically was trying to understand where this was, what was going on,
Speaker:and he unravels this like giant espionage plot of like, I think it was
Speaker:hackers in Russia using resources and
Speaker:Yeah.
Speaker:use resources and
Speaker:Yeah.
Speaker:And,
Speaker:networks in the us.
Speaker:and it was early days of cyber hacking and so like they, he went to the FBI
Speaker:and the FBI's like, I don't understand.
Speaker:Did they steal anything?
Speaker:And,
Speaker:He's like, no, but they're in our network, you know?
Speaker:yeah, and this is before like the normal internet as we think of it today, right?
Speaker:Right.
Speaker:Right,
Speaker:DARPA back in the day, and the connectivity between like research
Speaker:institutes and the Pentagon and other things, like it wasn't
Speaker:as widely open as it is today.
Speaker:right, right, right.
Speaker:It's a
Speaker:Uh
Speaker:but people should go read.
Speaker:Take a look at it.
Speaker:uh, where, where did the term, where did the term Ferage Cage come up in there?
Speaker:Faraday Cage came
Speaker:I.
Speaker:he was going into meet White Rose.
Speaker:Oh, the whole, the whole room's a Faraday cage.
Speaker:Okay.
Speaker:And then there's just this one little thing in there.
Speaker:There's this, uh, a
Speaker:Steganography software, uh, that Elliot uses to.
Speaker:Encrypt or to decrypt some, um, uh, information that he had in his wallet.
Speaker:There's this thing called Deep Sound, which used to, um, uh, to encrypt
Speaker:stuff inside a, uh, inside a music, which is kind of interesting, uh, way.
Speaker:Back to.
Speaker:Cliff stole in the middle of that story, he does set up a honeypot, and
Speaker:so you, you want to just sort of give the basic concept of what a honeypot is.
Speaker:Yeah, basically a honeypot is you create something that's so enticing for the
Speaker:attackers that they will then focus on that instead of everything else.
Speaker:And then this thing that you've created, you're monitoring, you're making it
Speaker:obvious, and you're able to detect when someone is attacking, so you
Speaker:know that someone's in your network.
Speaker:Yeah, because the, the one really key thing of a honeypot, at least
Speaker:a proper honeypot, I, I'd say a couple of things in there, right?
Speaker:One is we don't want to put anything in there that's actually valuable, right?
Speaker:Uh, because the whole point is to entice the, the hackers, uh, into that thing.
Speaker:And then the other thing is that it needs to not.
Speaker:That no one needs to ever log into the honeypot for any valid business reason.
Speaker:Yeah,
Speaker:Um, and and why would that be?
Speaker:because then it might be used for legit traffic, and you want to
Speaker:I.
Speaker:basically know when someone's actually hit it and nothing else should have
Speaker:hit it except a malicious person.
Speaker:Yeah, exactly.
Speaker:So you've got this server that looks very interesting, you know,
Speaker:a server with, with the name.
Speaker:Like, here's where all our important stuff is, right?
Speaker:Um, uh, like, like priority one, documents, so we, we name it
Speaker:like our 11, herbs and spices,
Speaker:Hm.
Speaker:corporate financial stuff.
Speaker:Um, you know, um, I'm, I'm, I'm hearkening back to being in a, I was at a. It
Speaker:was a vendor actually in, in my area.
Speaker:So it was up in the Irvine area and it was a vendor that I was working
Speaker:with and I just asked for a conference room to like make a phone call.
Speaker:And I went in the conference room and while I'm in this conference room, I
Speaker:look up at the whiteboard and all the corporate secrets were on the whiteboard.
Speaker:And it was like, it was like, um.
Speaker:No one should see this.
Speaker:Literally, they, they, they, they, no one needs to know this.
Speaker:It was something, something I was like, I was just like, uh, I don't
Speaker:think I'm supposed to be in here.
Speaker:take us picture?
Speaker:but I did not take a picture.
Speaker:Uh, for the record, this was before every phone had a camera on it.
Speaker:Yeah.
Speaker:Um, but yeah, so you, you, you, you, you, I guess you, you wouldn't want to
Speaker:make it super obvious, but you want to.
Speaker:Basically, um, included in the, in whatever naming convention
Speaker:that you typically have.
Speaker:And what, how would they find it then?
Speaker:Right.
Speaker:this is where they're doing like network discovery and right.
Speaker:Right.
Speaker:attacker gets into a network, they're probably gonna look and say, okay, what
Speaker:other systems can we try to compromise?
Speaker:And they will scan the network and say, okay, here's a system.
Speaker:Okay, are there any ports open?
Speaker:Are there any, what uh, operating system is it?
Speaker:Can I actually get into it because maybe it'll allow me to escalate privileges.
Speaker:Maybe that system has access to other resources.
Speaker:All the
Speaker:Yeah.
Speaker:Yeah.
Speaker:So during the reconnaissance phase, right, they, they identify
Speaker:this potential resource and then they, um, they get in it.
Speaker:And, and what you could also do is you could, uh, you could.
Speaker:Include maybe some common exploits, right?
Speaker:Do you remember what my favorite exploit is, or my least favorite exploit?
Speaker:Depending on how you look at it.
Speaker:No.
Speaker:The ransomware deployment protocol.
Speaker:Oh, RTP.
Speaker:Right.
Speaker:Uh, so you, you, you leave RDP on, you leave the administrative
Speaker:share on, uh, in Windows, right?
Speaker:Uh, you allow some well-known exploit, uh, to, to be there, right?
Speaker:So you, you, you, you, you, it's like you, you have this, you have this,
Speaker:uh, this, this building that's like.
Speaker:It's flashing red sign, really important stuff.
Speaker:And then you unlock all the doors,
Speaker:Yeah.
Speaker:right?
Speaker:So you leave RDP open, you leave, uh, you don't have to do all these
Speaker:things, but you could do one or more of these things where you leave RDP
Speaker:open, you have a common exploit.
Speaker:There's two times when you might want to have a honeypot.
Speaker:One is just a honeypot all the time.
Speaker:That's a server that's just there, just 24 7 that no one should ever access.
Speaker:And if they do access, it sets off the klaxon on alerts.
Speaker:Right?
Speaker:Um, and then, uh, the other would be if you believe you have been infiltrated.
Speaker:You don't, I mean, it takes a lot of chutzpah to do this second one,
Speaker:right, where, you know, you believe that someone's in your network, but
Speaker:you're not going to cut them off.
Speaker:You want to see what they're up to.
Speaker:Yeah.
Speaker:you could actually sort of turn on this honeypot
Speaker:And.
Speaker:and, and, oh, the reason why I was bringing that up is
Speaker:if you know that they've.
Speaker:They have a compromised, uh, account.
Speaker:They have access to a particular account.
Speaker:You would wanna make sure that that account is available in that server.
Speaker:The one other thing I was gonna mention, a honeypot, which you haven't mentioned
Speaker:yet, is you might also run a honeypot just to look for insider threats as well.
Speaker:Really?
Speaker:Yeah.
Speaker:It's a really good point, right?
Speaker:Yeah.
Speaker:Curtis, you should not have access to the financial data and.
Speaker:are you going and accessing a random financial share
Speaker:Right, right.
Speaker:Yeah.
Speaker:That'd be a really great way to find, uh, and you know, and I, I'll say this again.
Speaker:I'm gonna, I'm gonna think about another one of my favorite TV shows.
Speaker:I am The Danger No, no.
Speaker:I am the Danger.
Speaker:I got nothing,
Speaker:I, I am the one who knocks nothing.
Speaker:nothing.
Speaker:Um.
Speaker:Breaking bad.
Speaker:Oh,
Speaker:So the whole thing with, with, with the, the reason why he was so, one of
Speaker:the reasons why he was so successful is the concept of hiding in plain sight.
Speaker:Right?
Speaker:Once that veneer was off, it, it took five minutes to figure out, to, to
Speaker:prove that he was who he, who he was.
Speaker:He, what was it?
Speaker:What was his thing?
Speaker:What was his name?
Speaker:the German, the.
Speaker:Heisenberg it o once the, once the whole, the, the, the,
Speaker:the book on the toilet thing.
Speaker:Once that came out, hiding in sight only works.
Speaker:I if, if no one is looking
Speaker:Yep.
Speaker:right.
Speaker:Um, and so, like, for example, uh, Marty Bird, uh, in, in Ozark, he was.
Speaker:Not hiding in plain sight.
Speaker:Everybody knew he was up to the, the, the genius of that was that he,
Speaker:the FBI's looking directly at him and he manages to not get caught.
Speaker:Why?
Speaker:What, what's relevant in this case, a honeypot only works
Speaker:if nobody knows it's there.
Speaker:Yeah.
Speaker:And so when we have this in the episode, uh, Tyrell, uh, finds out that the
Speaker:honeypot and what, so it's kind of funny.
Speaker:him.
Speaker:Gideon tells him that there, that there's a honeypot and it, it's
Speaker:like, why did you tell, I mean, I guess Gideon, you know Gideon's
Speaker:didn't wanna
Speaker:a, you know.
Speaker:he didn't wanna lose a business.
Speaker:Right.
Speaker:Oh, that's right.
Speaker:He wanted him to know about all of the different stuff that
Speaker:they were doing to make sure
Speaker:because he also had to tell him about, uh, Angela and the DAT file and
Speaker:I.
Speaker:Kolby,
Speaker:Right?
Speaker:Yeah, yeah, yeah.
Speaker:So good news, bad news, good news, right?
Speaker:So he's like, I want to, I want you to know about all the things we're doing
Speaker:to try to find the, the bad guy, right?
Speaker:Um, and what I don't yet remember is why, what was Tyrell doing with the Honey Pot?
Speaker:So he wanted to go because he realized that, so here's the thing is I don't
Speaker:think they quite got Honey pot, correct.
Speaker:Okay.
Speaker:well, I think what they were referring to is they knew that,
Speaker:or they, Gideon suspected that that server was still compromised,
Speaker:Right.
Speaker:and so he set up monitoring on that
Speaker:Uh.
Speaker:than creating a new instance.
Speaker:So it's still essentially a honey pot because he's monitoring it.
Speaker:He's like firewalled it off from everything else so no one
Speaker:Right.
Speaker:it
Speaker:Yeah.
Speaker:He, he makes a point of saying that he, they think they're on
Speaker:the network or the on the main network, but they're actually not.
Speaker:Yeah.
Speaker:They fired a while it off.
Speaker:Yeah.
Speaker:Right.
Speaker:And so, so then Tyrell wants to go and look and say, okay,
Speaker:what have they compromised?
Speaker:Right.
Speaker:Which is when he starts digging in and that's when you're like,
Speaker:oh, we don't know what's going on.
Speaker:And he has to leave because of the murder investigation.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Um,
Speaker:also interesting though because even though he said yes, I fired it
Speaker:off from the main network, Tyrell from his desktop PC was able to
Speaker:SSH into it and connect into it.
Speaker:LA la show is great.
Speaker:I don't wanna hear any facts.
Speaker:Um, yeah.
Speaker:You know, I was gonna, yeah,
Speaker:Which,
Speaker:has his station over there.
Speaker:it's all like V land off, and it only allows inbound connections
Speaker:into that honeypot, right?
Speaker:So,
Speaker:Sure.
Speaker:We'll, we'll, yeah.
Speaker:Um,
Speaker:being nitpicky as a
Speaker:yeah, it's okay.
Speaker:person.
Speaker:It's, it's suited.
Speaker:But, um, but in terms of, so I, I would just say that, you know,
Speaker:if you haven't thought of the idea of having a honeypot server.
Speaker:Or multiple honeypot servers.
Speaker:Again, you know, you wanna, you wanna leave it with some common exploits,
Speaker:you wanna leave it, uh, available.
Speaker:You wanna make it look like it has some interesting stuff.
Speaker:Um, and again, I I, there's all these TV references that keep coming up
Speaker:in my head when I think about this.
Speaker:And, and a lot of them have to do actually with, uh, with Alias a TV show alias.
Speaker:There was, there were a lot of.
Speaker:Systems in there.
Speaker:There were a lot of episodes there where they would, they would
Speaker:want to make the, the bad actor
Speaker:It's almost like
Speaker:believe that they Yeah, they, well, they want the bad actor to believe
Speaker:they got something great when in reality they gave them garbage data.
Speaker:Yeah.
Speaker:Right.
Speaker:Um, and, uh, so, um.
Speaker:But, but, but that is the point.
Speaker:A again, it only works if, um, it only works if they don't know it's there.
Speaker:Yeah.
Speaker:It only works if they're able to get in, right?
Speaker:And again, if there's anything sniffing at those ports, it's a bad actor, right?
Speaker:And so then you can do some, some, um, forensic, um, analysis and you
Speaker:can figure out where that person is coming from and perhaps that will then
Speaker:allow you to shut off that person.
Speaker:Or the other thing is maybe it'll help you understand what are they looking for,
Speaker:Right, right.
Speaker:Because that's almost as important.
Speaker:Actually, that's probably more important than just shutting them out, right?
Speaker:Agreed.
Speaker:And you know, because you know when I've talked with Mike a lot, right?
Speaker:Our, you know, my.
Speaker:Dr. Mike.
Speaker:Mike?
Speaker:Yeah.
Speaker:Mike Sailor, my fellow co-author.
Speaker:Fellow co-author.
Speaker:That's redundant.
Speaker:Yes.
Speaker:co-author for my upcoming book, learning Ransomware Response and Recovery,
Speaker:which by the way, I just found out today is actually already on Amazon.
Speaker:Woohoo.
Speaker:You can, you can pre-order it on Amazon.
Speaker:Nice.
Speaker:I was like, well, I should probably finish the day
Speaker:we're in.
Speaker:Um, we're in the fa we finished tech review.
Speaker:The tech reviewers, uh, gave it overwhelmingly positive reviews.
Speaker:Uh, you know, if you, you know, change this, change that emphasize
Speaker:this deemphasize that, um, we, one of the things was that we did was we
Speaker:reduced, there was a history session, like the history of ransomware,
Speaker:and they're like, nobody cares.
Speaker:Nobody cares about the history.
Speaker:It was just, I think the only point of the history was.
Speaker:To say, you know, this has actually been going on for a long time, you know,
Speaker:all the way back since the eighties.
Speaker:The first,
Speaker:like it
Speaker:um,
Speaker:one page rather than like an entire
Speaker:yeah, that, yeah, it was like five pages.
Speaker:Yeah.
Speaker:Um, and, um, so the one page, or the, the, the first known, the first
Speaker:malware that's considered to be ransomware was actually called the
Speaker:aids, um, Trojan back in the eighties.
Speaker:Um.
Speaker:But, uh, anyway, so, oh, go back to Mike.
Speaker:One of the things that Mike talks a lot about is once you've like, stopped
Speaker:the, you know, the attack, uh, or while it's going on, but, but, but generally,
Speaker:once you've stopped the attack.
Speaker:Now's the time to do forensic analysis to figure out how did the attack happen?
Speaker:How did they get in?
Speaker:And the honeypot system would be a prime way to do that, right?
Speaker:Because if, if it's a good enough honeypot, perhaps there's many honeypots,
Speaker:Yeah.
Speaker:you're gonna see them logging in and you're gonna say, oh,
Speaker:they logged in from this system.
Speaker:Then you can go look at that system and you can see where that system,
Speaker:and you can follow the trail
Speaker:It's
Speaker:where it leads.
Speaker:Yeah, exactly Right.
Speaker:And then the other thing, the other key to that is, is that log storage, right?
Speaker:Uh, as, as much as you can set up log storage systems so that logs
Speaker:don't get just randomly deleted by the, by the threat actor.
Speaker:and preferably don't log locally.
Speaker:Yeah.
Speaker:Yeah.
Speaker:That's what, yeah, that's kind of what I'm saying, right?
Speaker:Se set up a system by which these important logs are stored
Speaker:remotely, uh, and, and immutably.
Speaker:Yes, I was gonna say, protect that log system just like you
Speaker:would protect your backup system.
Speaker:Yeah, exactly.
Speaker:Uh, it's a great use for an object storage system with immutability turned on.
Speaker:Right.
Speaker:Yeah.
Speaker:Just as the logs are, you know, created, shipped them off to the, um,
Speaker:you know, this other storage system, uh, because it is, it is very common.
Speaker:Um, you know, I was just, uh, you know, I just got to the part of the book where we
Speaker:were talking about how that, you know, um.
Speaker:Intrusion detection systems and, and, uh, EDR systems and all these
Speaker:things, they're really only great at stopping the initial attack.
Speaker:Once someone has access, one of the first things they do is shut those off.
Speaker:Right?
Speaker:And,
Speaker:there
Speaker:okay, go.
Speaker:an article earlier this week, or maybe it was last week, talking about how
Speaker:a lot of these malware operators now either have custom tools or off the
Speaker:shelf tools to actually disable EDR.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Uh, and so, and, and another thing they're gonna do is to, is to basically
Speaker:wipe the logs that will show the, you know, the, their, their trail.
Speaker:And, um, and so the, the key to that is to store that stuff, uh, externally.
Speaker:what Elliot did during the hack, right?
Speaker:Would he?
Speaker:Yep.
Speaker:Yeah, he did exactly that.
Speaker:Um, can you think of any, like, additional thoughts on the idea of a honeypot?
Speaker:Uh, not so much on the honeypot.
Speaker:No, I think that was it.
Speaker:The one thing I did wanna bring up, not around the honeypot, but just
Speaker:to quickly cover, is, um, also like Darlene was trying to set up this
Speaker:meeting with White Rose, right?
Speaker:And so she kept pushing the dark Army and do you remember what she did to Cisco?
Speaker:No.
Speaker:So Cisco is a guy, her contact at the Dark Army.
Speaker:Yeah.
Speaker:hacked his system, impersonated him their IRC chat channels and
Speaker:basically is the way that she, uh,
Speaker:Oh, right, right, right,
Speaker:to be able to get a meeting on the books with white rose.
Speaker:right.
Speaker:was like, don't talk to me.
Speaker:We're done after this.
Speaker:I can't believe you hacked me.
Speaker:So.
Speaker:Yeah,
Speaker:No honor amongst ths, I guess.
Speaker:yeah, yeah.
Speaker:Um, yeah, that, that, that was, uh, you know, when you're dealing with people
Speaker:like this that are this, that this good at like, getting into your systems,
Speaker:uh, kind of all bets are off, I think.
Speaker:could have benefited from a.
Speaker:Yeah.
Speaker:Yeah.
Speaker:Uh, it's, um.
Speaker:Just thinking about, um, you, you know, you know, it's funny, um, I
Speaker:got, I got, what was her name again?
Speaker:What's her name?
Speaker:Darlene,
Speaker:Darlene.
Speaker:Yeah.
Speaker:I got, I got, uh, uh, my wife and I got Darlene this week.
Speaker:Oh really?
Speaker:Yeah.
Speaker:So we got this, uh, this text message from my daughter.
Speaker:That said, Hey, um, when do you guys, do you guys have time on Sunday to
Speaker:do stuff for Lily's birthday, right?
Speaker:were mentioning, yeah.
Speaker:Yeah.
Speaker:And so, you know, we worked it out and we, we, we were working it out.
Speaker:You know, I want to make sure my, my other daughter's there and, and um, and so I
Speaker:called, I called my daughter and I said.
Speaker:I was like, Hey, so, you know, um, you know, da da da.
Speaker:We're try to work this out.
Speaker:And she's like, you know, I, I work on Sunday, like I work Sunday evening.
Speaker:She works nights.
Speaker:She's like, I work Sunday evening.
Speaker:And I'm like, well, you're the one that sent the text.
Speaker:And she's like, no, I was not.
Speaker:I was asleep.
Speaker:Lily took my phone and sent the message, asked me, when do you guys
Speaker:want to come over for Lily's birthday?
Speaker:Oh my gosh.
Speaker:That girl.
Speaker:So in, in four hours, we'll be having dinner with Lily, um,
Speaker:as orchestrated by Marissa.
Speaker:That is hilarious.
Speaker:My, my granddaughter, the hacker.
Speaker:Hmm.
Speaker:Uh, she got access to her cell phone.
Speaker:She must know her pin too.
Speaker:Yeah.
Speaker:Yeah.
Speaker:All right.
Speaker:Well, uh, hopefully you found some inform, you know, you found
Speaker:some useful information here in our discussion on honeypots.
Speaker:We're gonna continue talking about this episode in our next week.
Speaker:Uh, and, uh, I, I think that'll be good as well.
Speaker:Dun, dun.
Speaker:Wait to hear, to
Speaker:Done.
Speaker:us talk about persistent access.
Speaker:Yes, absolutely.
Speaker:All right, well, thanks, Prasanna for having another chat.
Speaker:Uh, I hope your breathing gets better, Curtis, but you do sound a lot
Speaker:better than when we first started, so
Speaker:I don't feel any better.
Speaker:Um, literally I feel like, like I inhaled chlorine.
Speaker:Like it's just not, it's not good.
Speaker:do you still have your scuba tanks with oxygen?
Speaker:Those don't, those aren't oxygen.
Speaker:They're just air.
Speaker:Okay.
Speaker:You don't put oxygen.
Speaker:Air,
Speaker:Don't, don't, don't, don't stay in your lane, buddy and with
Speaker:that, thanks folks for listening.
Speaker:Uh, that is a wrap.