Sept. 1, 2025

Honeypot Server Best Practices - From Mr. Robot to Reality

Honeypot Server Best Practices - From Mr. Robot to Reality

Learn the ins and outs of honeypot server deployment and management in this episode of The Backup Wrap-up. We break down the cybersecurity concept using examples from Mr. Robot episodes 1.6 and 1.7, showing how these deceptive systems can catch both external attackers and insider threats.

A honeypot server works by creating an enticing target that looks valuable but contains no real business data. The key is making it accessible through common exploits and monitoring every access attempt. Curtis and Prasanna discuss real-world implementation strategies, from naming conventions to network placement, and explain why the honeypot only works if attackers don't know it exists. They also cover the critical importance of remote log storage for forensic analysis and how these systems can reveal attack patterns and entry points during incident response.

Speaker:

You found the backup wrap up your go-to podcast for all things

Speaker:

backup recovery and cyber recovery.

Speaker:

In this episode, we're gonna talk about the cybersecurity concept

Speaker:

of a honeypot server through the lens of Mr. Robot episode or season

Speaker:

one, episode seven and eight.

Speaker:

We'll look at what makes one so effective, uh, how it can catch external hackers,

Speaker:

as well as, uh, insider threats.

Speaker:

Why?

Speaker:

The key to success is that nobody knows that it exists.

Speaker:

We also talk about proper log storage and why that's crucial for forensic analysis.

Speaker:

That's gonna be important if the bad guys actually come knocking.

Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.

Speaker:

Backup, and I've been passionate about backup and recovery for over 30 years.

Speaker:

Ever since.

Speaker:

I had to tell my boss that there were no backups of the production

Speaker:

database that we just lost.

Speaker:

I don't want that to happen to you, and that's why I do this.

Speaker:

On this podcast, we turn unappreciated admins into Cyber Recovery Heroes.

Speaker:

This is the backup wrap up.

Speaker:

welcome to the show.

Speaker:

Hi, I am w Curtis Preston, AKA, Mr. Backup, and I have with me a guy who

Speaker:

probably should just be taking me to the hospital instead of talking

Speaker:

to me on a podcast recording.

Speaker:

Prasanna Malaiyandi, how's it going?

Speaker:

Prasanna,

Speaker:

I am good Curtis, and I would love to take you to the hospital, but unfortunately

Speaker:

by the time I get down there, uh, I don't think it would help your cause.

Speaker:

you could probably be, I would be expired.

Speaker:

well, hopefully not, but hopefully you'll just be better about that.

Speaker:

Yeah, so hopefully this is short term, you know, short-lived.

Speaker:

So for this, yeah,

Speaker:

listeners

Speaker:

yeah.

Speaker:

This, this is, this is,

Speaker:

know what?

Speaker:

It's actually been a while since you've had an injury, knock on wood.

Speaker:

But

Speaker:

this count as an injury.

Speaker:

I, I self-inflicted I think does count.

Speaker:

So, all right, so I have this product, uh, you know, called Pure Cleanse.

Speaker:

By the way, for those of you who watch us on YouTube, thank

Speaker:

Yeah.

Speaker:

who are

Speaker:

Uh,

Speaker:

you can watch our

Speaker:

I, I'm,

Speaker:

Faces on

Speaker:

I, yeah.

Speaker:

Uh, same, same name.

Speaker:

Uh, so I'm holding up a, a, a cup that looks like it's full of pea.

Speaker:

It is not full of pea.

Speaker:

So it, it's a product used for like cleansing, like a room,

Speaker:

Yeah.

Speaker:

Especially of smells.

Speaker:

Right.

Speaker:

And, um.

Speaker:

disinfectant, basically.

Speaker:

an industrial.

Speaker:

Yeah.

Speaker:

And, and, um, but, but from an air perspective.

Speaker:

So you drop a tablet, um, let me see here.

Speaker:

Oh, this is, this is a, this is the way it comes.

Speaker:

You get, you get this, you get this tablet, right?

Speaker:

And you put, you fill water up to that, to the red line, and then you

Speaker:

in.

Speaker:

drop the tablet in, and then you leave the room.

Speaker:

And it, it smells kind of like chlorine, but like really strong chlorine.

Speaker:

And, um, and, and then you, and then once, once that's done

Speaker:

and I

Speaker:

and then you,

Speaker:

is, uh, leave the room.

Speaker:

yeah.

Speaker:

Leave the room.

Speaker:

Wow.

Speaker:

Definitely still some.

Speaker:

So I did that.

Speaker:

I did all the stuff right and then.

Speaker:

I went in and I took it out, and then I was showing it to, uh, my cleaning

Speaker:

person and I was showing it to her.

Speaker:

And then I was like, it smells kind of like chlorine.

Speaker:

And I like popped the lid off and took a whiff and my nose was like

Speaker:

literally this close, and I thought I was gonna have to go to the hospital

Speaker:

yeah.

Speaker:

not convinced that I shouldn't be in the hospital.

Speaker:

Uh, my, my lungs, my, my airways closed up.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

And, uh, that was, that was not a good move.

Speaker:

like you dummy, you're not supposed to be sniffing that stuff.

Speaker:

Yeah,

Speaker:

you.

Speaker:

yeah, yeah.

Speaker:

You, you're right.

Speaker:

You're probably right.

Speaker:

It was probably a, uh, yeah.

Speaker:

And basically it was like, it was like I sniffed fire into my air pod, you

Speaker:

know, into my air, long air airways.

Speaker:

Yeah.

Speaker:

It burned like a lot and it's still, and then like immediately, you know,

Speaker:

my nose started running and I couldn't breathe and I, I, I thought I was

Speaker:

gonna pass out, but luckily I did not.

Speaker:

And, uh, it's now an hour later and I'm still

Speaker:

Feeling it.

Speaker:

yeah, I'm still feeling it.

Speaker:

Um, yeah.

Speaker:

you do need to take a break during the podcast and go see, seek

Speaker:

medical attention, I think our listeners would totally understand.

Speaker:

Um, I think, you know, just, uh,

Speaker:

Yeah.

Speaker:

good times, good times.

Speaker:

Uh, so don't do that.

Speaker:

Uh, I like the product.

Speaker:

I like the product a lot, but, uh, don't, don't breathe it afterwards.

Speaker:

Not, you know, something that's meant to be an industrial

Speaker:

strength, like cleanse five.

Speaker:

It's, it's supposed to cleanse 500 square feet.

Speaker:

Then I just sniffed it like a maroon.

Speaker:

Oh, Curtis, Curtis.

Speaker:

Curtis, what are we going to do with you?

Speaker:

Nothing, nothing.

Speaker:

There's, it is just hopeless sometimes.

Speaker:

Sometimes I just ask myself, you know?

Speaker:

But, uh,

Speaker:

But it has been a while though, since you've injured

Speaker:

since I've done something really stupid.

Speaker:

Yeah, yeah.

Speaker:

Well, since I've,

Speaker:

well, no, no.

Speaker:

no.

Speaker:

I, it's probably been 2, 3, 4 months.

Speaker:

What was the last thing?

Speaker:

What are you, what are you thinking of?

Speaker:

Uh, remember when you, uh, were disinfecting a different room in your

Speaker:

Oh

Speaker:

uh, you decided to walk in while said

Speaker:

yeah, I was, that was an ozone machine and um, for those of you that aren't

Speaker:

familiar, so ozone is like oh two.

Speaker:

Right.

Speaker:

I think it's like two oxygen molecules and, um, I have a, again, an industrial

Speaker:

strength ozone machine, and you know, when you have an ozone machine, you're

Speaker:

not, you're not supposed to be in there.

Speaker:

And I, I went in because like, I, I was just sorting out

Speaker:

the, like, the timing part.

Speaker:

And, uh, I went in there and, um.

Speaker:

I was only in there maybe 30 seconds.

Speaker:

And same thing like this, like I, I, I had to go, I had to go sit down

Speaker:

for a while 'cause I couldn't breathe like my, again, my airway constricted.

Speaker:

So I think maybe, uh, for future reference,

Speaker:

Yeah.

Speaker:

seems potentially dangerous, don't sniff it.

Speaker:

Don't breathe it.

Speaker:

Well, I, I held my breath when I went in the room.

Speaker:

Right.

Speaker:

I ne I, I was just in, in there to sort out the timer.

Speaker:

I held my breath when I went in, but I was just in just a little bit too long

Speaker:

and so I ended up having to inhale and I inhaled, uh, and it was not good.

Speaker:

I'm just saying.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

yeah, so for those listeners, if Curtis sounds a little under the

Speaker:

weather, that is why we wish him all a speedy recovery and hope he

Speaker:

comes back to his normal self soon.

Speaker:

Yeah.

Speaker:

So, uh, this will be an interesting episode.

Speaker:

We're gonna, we're we're gonna, we're gonna take two episodes, one episode

Speaker:

of Mr. Robot in our continued series.

Speaker:

Spoiler alert, we're gonna talk about all kinds of stuff.

Speaker:

And our continued series on stuff that we can pick up from Mr. Robot.

Speaker:

And the first episode, which is episode 1.6,

Speaker:

Yeah.

Speaker:

right?

Speaker:

Uh, and then second episode 1.7, 1.6.

Speaker:

Didn't have a whole lot in it from a cybersecurity perspective.

Speaker:

It did have a whole lot in it from a crime perspective, but, but not from

Speaker:

a cyber crime perspective so much.

Speaker:

You wanna, you wanna summarize, uh, 1.6 or you want me to do it?

Speaker:

Uh, I'll let you go ahead and do it.

Speaker:

Okay.

Speaker:

Right.

Speaker:

So this,

Speaker:

said, it was all like backstory, which

Speaker:

yeah.

Speaker:

the story, but not so much from a tech perspective.

Speaker:

Yeah.

Speaker:

So you may remember from the last episode, uh, it ended with Shayla's death.

Speaker:

So Elliot's neighbor.

Speaker:

Friend, uh, ended with her death.

Speaker:

This episode opens with like a flashback of when, when he first met her.

Speaker:

And, um, the, um, uh, and then we also see that Angela makes a deal with Terry

Speaker:

Colby, the former CTO of evil corp, that she will testify that she broke

Speaker:

the chain of custody with this DAT file.

Speaker:

And why does that matter?

Speaker:

It's because it renders it inadmissible in, uh, in court, right?

Speaker:

And

Speaker:

Uh,

Speaker:

the

Speaker:

yeah,

Speaker:

like their smoking gun to say

Speaker:

yeah, it's, yeah, exactly.

Speaker:

And so he, he's gonna, um, she's gonna say that she broke chain

Speaker:

of custody, which will then essentially let him off the hook.

Speaker:

But in, in, uh, she, he, he's going to in, um, what, what would you call that?

Speaker:

Um, what would you call that in exchange for him saying that he was

Speaker:

there when they decided to poison, you know, her family essentially.

Speaker:

Right.

Speaker:

Um, then we start to see the beginnings of this meetings with this

Speaker:

mysterious individual known as White Rose, the leader of the Dark Army.

Speaker:

Right.

Speaker:

We've, uh.

Speaker:

and I think in.

Speaker:

1.6. We don't actually know who white rose is.

Speaker:

No, no.

Speaker:

they've kind of talked about it before.

Speaker:

It's like the person who leads a dark army, but like we have

Speaker:

no idea who this person is and they just wanna set up a meeting.

Speaker:

And do you wanna talk about why they wanna set up a meeting?

Speaker:

I.

Speaker:

Um, well this is, this is because they want to do, they want to

Speaker:

be able to do attack all of the different, uh, steel mountain.

Speaker:

Um.

Speaker:

Data centers all at one time, and they need the dark army to be able to do that.

Speaker:

Right?

Speaker:

Yep.

Speaker:

Yeah.

Speaker:

Um, and then, um, you know, we get this, um, we get this, uh, this confession

Speaker:

from Elliot to, to his therapist that like, you know, he's act everything

Speaker:

and he's actually quite open with her, but in the process of opening

Speaker:

with her, he scares a crap out of her.

Speaker:

Like

Speaker:

Um,

Speaker:

Yeah,

Speaker:

yeah.

Speaker:

Yeah.

Speaker:

Uh.

Speaker:

says, I hacked you.

Speaker:

I know everything about

Speaker:

Yeah.

Speaker:

don't take your medicines.

Speaker:

I know all those things about you.

Speaker:

Yeah.

Speaker:

I know your, I know your,

Speaker:

Deepest secrets.

Speaker:

yeah.

Speaker:

Your deepest secrets.

Speaker:

Uh, yeah.

Speaker:

And then, and then, uh, Tyrell, uh, does a little thing.

Speaker:

Yeah, so Tyrell, if you remember from the last episode, he and his wife had gone

Speaker:

and had dinner with Scott and Sharon and there's sort of that entire scene in the

Speaker:

Yeah.

Speaker:

of that.

Speaker:

And

Speaker:

Yeah.

Speaker:

now it's actually where Scott gets officially announced as a CTO and

Speaker:

they throw a shin dig at the office.

Speaker:

once again, Tyrell is like, Hey, I'm gonna go meet up with Sharon.

Speaker:

He is like, come up to the rooftop, I know what you want.

Speaker:

And she shows up and uh, yeah.

Speaker:

And then he basically kills her

Speaker:

Yeah, he just strangles her.

Speaker:

Uh, that was a, that was a sort of an unexpected, you think

Speaker:

they're about to, you know,

Speaker:

yeah.

Speaker:

t wow.

Speaker:

And then next thing you know, it's,

Speaker:

Yeah.

Speaker:

and, uh, that was not good.

Speaker:

Yeah.

Speaker:

Um, so if we forward to, uh, the next episode.

Speaker:

Which is 1.7 AKA white rose.

Speaker:

So you see Darlene stealing a gun, right?

Speaker:

Because she's very worried about the fact that they're gonna meet

Speaker:

white rose and she, you know, she's scared of, of whoever white rose is.

Speaker:

Um, and then, um, we, we learned from, um.

Speaker:

Gideon visits Tyrell, and sort of says, Hey, this is all the stuff

Speaker:

that we've been doing on your behalf.

Speaker:

And he mentions that there actually is a honeypot.

Speaker:

We're gonna talk about that.

Speaker:

That's sort of, I think they're gonna be the key thing we're

Speaker:

gonna talk about in this episode.

Speaker:

But, uh, uh, and, and nobody, nobody but nobody, but uh, uh, Gideon seems

Speaker:

to want this honeypot to exist.

Speaker:

Um, and then, um.

Speaker:

The, we find out, uh, obviously there's this whole thing about, uh,

Speaker:

sort of the, the subplot is Tyrell freaking out about the fact that people

Speaker:

are looking into Sharon's murder.

Speaker:

Uh, his wife finds out about Sharon's murder.

Speaker:

Uh, but then we get, um, the whole big reveal about Mr. Robot.

Speaker:

So there's been a lot of, up to this point, there's been a

Speaker:

lot of people theorizing that Mr. Robot was all in his head.

Speaker:

And it's still, I'm still a little confused because Mr. Robot is his

Speaker:

father, and he's not, he's not old enough to be his father, so that

Speaker:

means he's gotta be in his head.

Speaker:

But that doesn't make any sense because we also have the scene of

Speaker:

him meeting with, with, uh, Tyrell.

Speaker:

Tyrell, and also he's talking to Darlene and all sorts of other things

Speaker:

He's not old enough to be his father.

Speaker:

Right.

Speaker:

Well, eh, I think he's old enough to be his father at the point, because Elliot

Speaker:

goes back right in this episode and he, so, because towards the end, right?

Speaker:

Um, he goes and tries to kiss Darlene.

Speaker:

Right.

Speaker:

Oh yeah.

Speaker:

Oh, I forgot about that.

Speaker:

And Darlene is like, Elliot, do you not know who I am?

Speaker:

Yeah.

Speaker:

like, you're Darlene.

Speaker:

And she's

Speaker:

Yeah.

Speaker:

am I?

Speaker:

then he's like, oh, you're my sister.

Speaker:

You're Princess Leia.

Speaker:

yeah.

Speaker:

And then he, and then he freaks out because he's like,

Speaker:

uh, what all am I forgetting?

Speaker:

And so if folks remember, he like would.

Speaker:

Compromise someone then delete all the data.

Speaker:

But before he did, he would burn it on a CD and keep the CD and name it with like

Speaker:

different bands and things like that.

Speaker:

Yeah.

Speaker:

he goes back and looks and he finds a CD that's not labeled and he looks

Speaker:

at it and he realizes it's his.

Speaker:

And

Speaker:

Yeah.

Speaker:

looking at the pictures and he sees like a picture of Mr. Robot, right?

Speaker:

And he sees pictures of his sister, Darlene and all the rest.

Speaker:

And then he starts putting together.

Speaker:

And then he's like, what is going on?

Speaker:

And that's when the episode ends with Mr. Robot pounding on the

Speaker:

door and saying, we need to talk

Speaker:

we need to talk.

Speaker:

It doesn't, I'm, I'm still confused.

Speaker:

And that, that's because like he's basically the same age

Speaker:

as a

Speaker:

as, as the picture, so.

Speaker:

Yeah.

Speaker:

So I'm very, so, you know, because I'm, I'm all confused,

Speaker:

but, uh, remind me who is Krista.

Speaker:

Krista is the psychologist

Speaker:

Oh, right, right, right.

Speaker:

Okay.

Speaker:

Um, okay.

Speaker:

Uh,

Speaker:

all right.

Speaker:

yeah.

Speaker:

And there's also, so one thing we didn't touch upon, and maybe we'll talk about

Speaker:

it uh, maybe in a different episode, maybe in this episode, right, is one of

Speaker:

the scenes is Cisco, who's the person who works for the Dark Army, right?

Speaker:

Yeah.

Speaker:

Ollie the cd.

Speaker:

Right.

Speaker:

Ollie and was like, Hey, I need you to do this for me.

Speaker:

Yeah.

Speaker:

And then there's this entire scene where Ali is basically in the middle of

Speaker:

this attack that happens on All Safe,

Speaker:

Right.

Speaker:

He goes up to Elliot and is like, Hey, I need you to go drop these

Speaker:

hard drives off at this place

Speaker:

Yeah.

Speaker:

And it was all the setup to, yeah.

Speaker:

It was all a setup.

Speaker:

And that is where he meets, uh, white Rose.

Speaker:

Yeah, play.

Speaker:

It's, you know what's funny is I knew BD Wong was in this episode

Speaker:

because it was in the thing.

Speaker:

And if it hadn't been for that, I'm not sure I would've recognized BD Wong.

Speaker:

But, uh, 'cause he is, he's playing, uh, you know, a trans, uh,

Speaker:

woman essentially in the episode.

Speaker:

Uh, and, um.

Speaker:

Uh, I, yeah, I'm not sure I would, I would've recognized him, but, um, so yeah.

Speaker:

So we're, we're gonna come back to that.

Speaker:

We're gonna, I think we're gonna do a separate episode on that aspect.

Speaker:

But today I, I wanted to talk about this idea of a honeypot, which is a really

Speaker:

cool idea that you can use, uh, and is frequently used in cybersecurity.

Speaker:

And I first learned about the concept of a honeypot.

Speaker:

When reading, um, a cuckoo egg,

Speaker:

Yep.

Speaker:

you read a cuckoo egg.

Speaker:

Right.

Speaker:

Um, and you wanna, you want to do a quick summary of a cuckoo

Speaker:

egg for those who haven't read

Speaker:

a Cuckoo's Egg is a nonfiction recount of Cliff Stoller, I think.

Speaker:

Ital?

Speaker:

Yeah.

Speaker:

Right.

Speaker:

who used to be, uh, employed at Berkeley, and he was managing computer

Speaker:

infrastructure and he once noticed that a mainframe, like the timing

Speaker:

would be off on the mainframe.

Speaker:

he was like, who's using the resources?

Speaker:

This is way back in the day when you shared CPUs and

Speaker:

all the other things and you

Speaker:

it was like a, it was like a three second difference between

Speaker:

the two different time, um, yeah.

Speaker:

Accounting system.

Speaker:

he basically was trying to understand where this was, what was going on,

Speaker:

and he unravels this like giant espionage plot of like, I think it was

Speaker:

hackers in Russia using resources and

Speaker:

Yeah.

Speaker:

use resources and

Speaker:

Yeah.

Speaker:

And,

Speaker:

networks in the us.

Speaker:

and it was early days of cyber hacking and so like they, he went to the FBI

Speaker:

and the FBI's like, I don't understand.

Speaker:

Did they steal anything?

Speaker:

And,

Speaker:

He's like, no, but they're in our network, you know?

Speaker:

yeah, and this is before like the normal internet as we think of it today, right?

Speaker:

Right.

Speaker:

Right,

Speaker:

DARPA back in the day, and the connectivity between like research

Speaker:

institutes and the Pentagon and other things, like it wasn't

Speaker:

as widely open as it is today.

Speaker:

right, right, right.

Speaker:

It's a

Speaker:

Uh

Speaker:

but people should go read.

Speaker:

Take a look at it.

Speaker:

uh, where, where did the term, where did the term Ferage Cage come up in there?

Speaker:

Faraday Cage came

Speaker:

I.

Speaker:

he was going into meet White Rose.

Speaker:

Oh, the whole, the whole room's a Faraday cage.

Speaker:

Okay.

Speaker:

And then there's just this one little thing in there.

Speaker:

There's this, uh, a

Speaker:

Steganography software, uh, that Elliot uses to.

Speaker:

Encrypt or to decrypt some, um, uh, information that he had in his wallet.

Speaker:

There's this thing called Deep Sound, which used to, um, uh, to encrypt

Speaker:

stuff inside a, uh, inside a music, which is kind of interesting, uh, way.

Speaker:

Back to.

Speaker:

Cliff stole in the middle of that story, he does set up a honeypot, and

Speaker:

so you, you want to just sort of give the basic concept of what a honeypot is.

Speaker:

Yeah, basically a honeypot is you create something that's so enticing for the

Speaker:

attackers that they will then focus on that instead of everything else.

Speaker:

And then this thing that you've created, you're monitoring, you're making it

Speaker:

obvious, and you're able to detect when someone is attacking, so you

Speaker:

know that someone's in your network.

Speaker:

Yeah, because the, the one really key thing of a honeypot, at least

Speaker:

a proper honeypot, I, I'd say a couple of things in there, right?

Speaker:

One is we don't want to put anything in there that's actually valuable, right?

Speaker:

Uh, because the whole point is to entice the, the hackers, uh, into that thing.

Speaker:

And then the other thing is that it needs to not.

Speaker:

That no one needs to ever log into the honeypot for any valid business reason.

Speaker:

Yeah,

Speaker:

Um, and and why would that be?

Speaker:

because then it might be used for legit traffic, and you want to

Speaker:

I.

Speaker:

basically know when someone's actually hit it and nothing else should have

Speaker:

hit it except a malicious person.

Speaker:

Yeah, exactly.

Speaker:

So you've got this server that looks very interesting, you know,

Speaker:

a server with, with the name.

Speaker:

Like, here's where all our important stuff is, right?

Speaker:

Um, uh, like, like priority one, documents, so we, we name it

Speaker:

like our 11, herbs and spices,

Speaker:

Hm.

Speaker:

corporate financial stuff.

Speaker:

Um, you know, um, I'm, I'm, I'm hearkening back to being in a, I was at a. It

Speaker:

was a vendor actually in, in my area.

Speaker:

So it was up in the Irvine area and it was a vendor that I was working

Speaker:

with and I just asked for a conference room to like make a phone call.

Speaker:

And I went in the conference room and while I'm in this conference room, I

Speaker:

look up at the whiteboard and all the corporate secrets were on the whiteboard.

Speaker:

And it was like, it was like, um.

Speaker:

No one should see this.

Speaker:

Literally, they, they, they, they, no one needs to know this.

Speaker:

It was something, something I was like, I was just like, uh, I don't

Speaker:

think I'm supposed to be in here.

Speaker:

take us picture?

Speaker:

but I did not take a picture.

Speaker:

Uh, for the record, this was before every phone had a camera on it.

Speaker:

Yeah.

Speaker:

Um, but yeah, so you, you, you, you, you, I guess you, you wouldn't want to

Speaker:

make it super obvious, but you want to.

Speaker:

Basically, um, included in the, in whatever naming convention

Speaker:

that you typically have.

Speaker:

And what, how would they find it then?

Speaker:

Right.

Speaker:

this is where they're doing like network discovery and right.

Speaker:

Right.

Speaker:

attacker gets into a network, they're probably gonna look and say, okay, what

Speaker:

other systems can we try to compromise?

Speaker:

And they will scan the network and say, okay, here's a system.

Speaker:

Okay, are there any ports open?

Speaker:

Are there any, what uh, operating system is it?

Speaker:

Can I actually get into it because maybe it'll allow me to escalate privileges.

Speaker:

Maybe that system has access to other resources.

Speaker:

All the

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

So during the reconnaissance phase, right, they, they identify

Speaker:

this potential resource and then they, um, they get in it.

Speaker:

And, and what you could also do is you could, uh, you could.

Speaker:

Include maybe some common exploits, right?

Speaker:

Do you remember what my favorite exploit is, or my least favorite exploit?

Speaker:

Depending on how you look at it.

Speaker:

No.

Speaker:

The ransomware deployment protocol.

Speaker:

Oh, RTP.

Speaker:

Right.

Speaker:

Uh, so you, you, you leave RDP on, you leave the administrative

Speaker:

share on, uh, in Windows, right?

Speaker:

Uh, you allow some well-known exploit, uh, to, to be there, right?

Speaker:

So you, you, you, you, you, it's like you, you have this, you have this,

Speaker:

uh, this, this building that's like.

Speaker:

It's flashing red sign, really important stuff.

Speaker:

And then you unlock all the doors,

Speaker:

Yeah.

Speaker:

right?

Speaker:

So you leave RDP open, you leave, uh, you don't have to do all these

Speaker:

things, but you could do one or more of these things where you leave RDP

Speaker:

open, you have a common exploit.

Speaker:

There's two times when you might want to have a honeypot.

Speaker:

One is just a honeypot all the time.

Speaker:

That's a server that's just there, just 24 7 that no one should ever access.

Speaker:

And if they do access, it sets off the klaxon on alerts.

Speaker:

Right?

Speaker:

Um, and then, uh, the other would be if you believe you have been infiltrated.

Speaker:

You don't, I mean, it takes a lot of chutzpah to do this second one,

Speaker:

right, where, you know, you believe that someone's in your network, but

Speaker:

you're not going to cut them off.

Speaker:

You want to see what they're up to.

Speaker:

Yeah.

Speaker:

you could actually sort of turn on this honeypot

Speaker:

And.

Speaker:

and, and, oh, the reason why I was bringing that up is

Speaker:

if you know that they've.

Speaker:

They have a compromised, uh, account.

Speaker:

They have access to a particular account.

Speaker:

You would wanna make sure that that account is available in that server.

Speaker:

The one other thing I was gonna mention, a honeypot, which you haven't mentioned

Speaker:

yet, is you might also run a honeypot just to look for insider threats as well.

Speaker:

Really?

Speaker:

Yeah.

Speaker:

It's a really good point, right?

Speaker:

Yeah.

Speaker:

Curtis, you should not have access to the financial data and.

Speaker:

are you going and accessing a random financial share

Speaker:

Right, right.

Speaker:

Yeah.

Speaker:

That'd be a really great way to find, uh, and you know, and I, I'll say this again.

Speaker:

I'm gonna, I'm gonna think about another one of my favorite TV shows.

Speaker:

I am The Danger No, no.

Speaker:

I am the Danger.

Speaker:

I got nothing,

Speaker:

I, I am the one who knocks nothing.

Speaker:

nothing.

Speaker:

Um.

Speaker:

Breaking bad.

Speaker:

Oh,

Speaker:

So the whole thing with, with, with the, the reason why he was so, one of

Speaker:

the reasons why he was so successful is the concept of hiding in plain sight.

Speaker:

Right?

Speaker:

Once that veneer was off, it, it took five minutes to figure out, to, to

Speaker:

prove that he was who he, who he was.

Speaker:

He, what was it?

Speaker:

What was his thing?

Speaker:

What was his name?

Speaker:

the German, the.

Speaker:

Heisenberg it o once the, once the whole, the, the, the,

Speaker:

the book on the toilet thing.

Speaker:

Once that came out, hiding in sight only works.

Speaker:

I if, if no one is looking

Speaker:

Yep.

Speaker:

right.

Speaker:

Um, and so, like, for example, uh, Marty Bird, uh, in, in Ozark, he was.

Speaker:

Not hiding in plain sight.

Speaker:

Everybody knew he was up to the, the, the genius of that was that he,

Speaker:

the FBI's looking directly at him and he manages to not get caught.

Speaker:

Why?

Speaker:

What, what's relevant in this case, a honeypot only works

Speaker:

if nobody knows it's there.

Speaker:

Yeah.

Speaker:

And so when we have this in the episode, uh, Tyrell, uh, finds out that the

Speaker:

honeypot and what, so it's kind of funny.

Speaker:

him.

Speaker:

Gideon tells him that there, that there's a honeypot and it, it's

Speaker:

like, why did you tell, I mean, I guess Gideon, you know Gideon's

Speaker:

didn't wanna

Speaker:

a, you know.

Speaker:

he didn't wanna lose a business.

Speaker:

Right.

Speaker:

Oh, that's right.

Speaker:

He wanted him to know about all of the different stuff that

Speaker:

they were doing to make sure

Speaker:

because he also had to tell him about, uh, Angela and the DAT file and

Speaker:

I.

Speaker:

Kolby,

Speaker:

Right?

Speaker:

Yeah, yeah, yeah.

Speaker:

So good news, bad news, good news, right?

Speaker:

So he's like, I want to, I want you to know about all the things we're doing

Speaker:

to try to find the, the bad guy, right?

Speaker:

Um, and what I don't yet remember is why, what was Tyrell doing with the Honey Pot?

Speaker:

So he wanted to go because he realized that, so here's the thing is I don't

Speaker:

think they quite got Honey pot, correct.

Speaker:

Okay.

Speaker:

well, I think what they were referring to is they knew that,

Speaker:

or they, Gideon suspected that that server was still compromised,

Speaker:

Right.

Speaker:

and so he set up monitoring on that

Speaker:

Uh.

Speaker:

than creating a new instance.

Speaker:

So it's still essentially a honey pot because he's monitoring it.

Speaker:

He's like firewalled it off from everything else so no one

Speaker:

Right.

Speaker:

it

Speaker:

Yeah.

Speaker:

He, he makes a point of saying that he, they think they're on

Speaker:

the network or the on the main network, but they're actually not.

Speaker:

Yeah.

Speaker:

They fired a while it off.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

And so, so then Tyrell wants to go and look and say, okay,

Speaker:

what have they compromised?

Speaker:

Right.

Speaker:

Which is when he starts digging in and that's when you're like,

Speaker:

oh, we don't know what's going on.

Speaker:

And he has to leave because of the murder investigation.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Um,

Speaker:

also interesting though because even though he said yes, I fired it

Speaker:

off from the main network, Tyrell from his desktop PC was able to

Speaker:

SSH into it and connect into it.

Speaker:

LA la show is great.

Speaker:

I don't wanna hear any facts.

Speaker:

Um, yeah.

Speaker:

You know, I was gonna, yeah,

Speaker:

Which,

Speaker:

has his station over there.

Speaker:

it's all like V land off, and it only allows inbound connections

Speaker:

into that honeypot, right?

Speaker:

So,

Speaker:

Sure.

Speaker:

We'll, we'll, yeah.

Speaker:

Um,

Speaker:

being nitpicky as a

Speaker:

yeah, it's okay.

Speaker:

person.

Speaker:

It's, it's suited.

Speaker:

But, um, but in terms of, so I, I would just say that, you know,

Speaker:

if you haven't thought of the idea of having a honeypot server.

Speaker:

Or multiple honeypot servers.

Speaker:

Again, you know, you wanna, you wanna leave it with some common exploits,

Speaker:

you wanna leave it, uh, available.

Speaker:

You wanna make it look like it has some interesting stuff.

Speaker:

Um, and again, I I, there's all these TV references that keep coming up

Speaker:

in my head when I think about this.

Speaker:

And, and a lot of them have to do actually with, uh, with Alias a TV show alias.

Speaker:

There was, there were a lot of.

Speaker:

Systems in there.

Speaker:

There were a lot of episodes there where they would, they would

Speaker:

want to make the, the bad actor

Speaker:

It's almost like

Speaker:

believe that they Yeah, they, well, they want the bad actor to believe

Speaker:

they got something great when in reality they gave them garbage data.

Speaker:

Yeah.

Speaker:

Right.

Speaker:

Um, and, uh, so, um.

Speaker:

But, but, but that is the point.

Speaker:

A again, it only works if, um, it only works if they don't know it's there.

Speaker:

Yeah.

Speaker:

It only works if they're able to get in, right?

Speaker:

And again, if there's anything sniffing at those ports, it's a bad actor, right?

Speaker:

And so then you can do some, some, um, forensic, um, analysis and you

Speaker:

can figure out where that person is coming from and perhaps that will then

Speaker:

allow you to shut off that person.

Speaker:

Or the other thing is maybe it'll help you understand what are they looking for,

Speaker:

Right, right.

Speaker:

Because that's almost as important.

Speaker:

Actually, that's probably more important than just shutting them out, right?

Speaker:

Agreed.

Speaker:

And you know, because you know when I've talked with Mike a lot, right?

Speaker:

Our, you know, my.

Speaker:

Dr. Mike.

Speaker:

Mike?

Speaker:

Yeah.

Speaker:

Mike Sailor, my fellow co-author.

Speaker:

Fellow co-author.

Speaker:

That's redundant.

Speaker:

Yes.

Speaker:

co-author for my upcoming book, learning Ransomware Response and Recovery,

Speaker:

which by the way, I just found out today is actually already on Amazon.

Speaker:

Woohoo.

Speaker:

You can, you can pre-order it on Amazon.

Speaker:

Nice.

Speaker:

I was like, well, I should probably finish the day

Speaker:

we're in.

Speaker:

Um, we're in the fa we finished tech review.

Speaker:

The tech reviewers, uh, gave it overwhelmingly positive reviews.

Speaker:

Uh, you know, if you, you know, change this, change that emphasize

Speaker:

this deemphasize that, um, we, one of the things was that we did was we

Speaker:

reduced, there was a history session, like the history of ransomware,

Speaker:

and they're like, nobody cares.

Speaker:

Nobody cares about the history.

Speaker:

It was just, I think the only point of the history was.

Speaker:

To say, you know, this has actually been going on for a long time, you know,

Speaker:

all the way back since the eighties.

Speaker:

The first,

Speaker:

like it

Speaker:

um,

Speaker:

one page rather than like an entire

Speaker:

yeah, that, yeah, it was like five pages.

Speaker:

Yeah.

Speaker:

Um, and, um, so the one page, or the, the, the first known, the first

Speaker:

malware that's considered to be ransomware was actually called the

Speaker:

aids, um, Trojan back in the eighties.

Speaker:

Um.

Speaker:

But, uh, anyway, so, oh, go back to Mike.

Speaker:

One of the things that Mike talks a lot about is once you've like, stopped

Speaker:

the, you know, the attack, uh, or while it's going on, but, but, but generally,

Speaker:

once you've stopped the attack.

Speaker:

Now's the time to do forensic analysis to figure out how did the attack happen?

Speaker:

How did they get in?

Speaker:

And the honeypot system would be a prime way to do that, right?

Speaker:

Because if, if it's a good enough honeypot, perhaps there's many honeypots,

Speaker:

Yeah.

Speaker:

you're gonna see them logging in and you're gonna say, oh,

Speaker:

they logged in from this system.

Speaker:

Then you can go look at that system and you can see where that system,

Speaker:

and you can follow the trail

Speaker:

It's

Speaker:

where it leads.

Speaker:

Yeah, exactly Right.

Speaker:

And then the other thing, the other key to that is, is that log storage, right?

Speaker:

Uh, as, as much as you can set up log storage systems so that logs

Speaker:

don't get just randomly deleted by the, by the threat actor.

Speaker:

and preferably don't log locally.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

That's what, yeah, that's kind of what I'm saying, right?

Speaker:

Se set up a system by which these important logs are stored

Speaker:

remotely, uh, and, and immutably.

Speaker:

Yes, I was gonna say, protect that log system just like you

Speaker:

would protect your backup system.

Speaker:

Yeah, exactly.

Speaker:

Uh, it's a great use for an object storage system with immutability turned on.

Speaker:

Right.

Speaker:

Yeah.

Speaker:

Just as the logs are, you know, created, shipped them off to the, um,

Speaker:

you know, this other storage system, uh, because it is, it is very common.

Speaker:

Um, you know, I was just, uh, you know, I just got to the part of the book where we

Speaker:

were talking about how that, you know, um.

Speaker:

Intrusion detection systems and, and, uh, EDR systems and all these

Speaker:

things, they're really only great at stopping the initial attack.

Speaker:

Once someone has access, one of the first things they do is shut those off.

Speaker:

Right?

Speaker:

And,

Speaker:

there

Speaker:

okay, go.

Speaker:

an article earlier this week, or maybe it was last week, talking about how

Speaker:

a lot of these malware operators now either have custom tools or off the

Speaker:

shelf tools to actually disable EDR.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Uh, and so, and, and another thing they're gonna do is to, is to basically

Speaker:

wipe the logs that will show the, you know, the, their, their trail.

Speaker:

And, um, and so the, the key to that is to store that stuff, uh, externally.

Speaker:

what Elliot did during the hack, right?

Speaker:

Would he?

Speaker:

Yep.

Speaker:

Yeah, he did exactly that.

Speaker:

Um, can you think of any, like, additional thoughts on the idea of a honeypot?

Speaker:

Uh, not so much on the honeypot.

Speaker:

No, I think that was it.

Speaker:

The one thing I did wanna bring up, not around the honeypot, but just

Speaker:

to quickly cover, is, um, also like Darlene was trying to set up this

Speaker:

meeting with White Rose, right?

Speaker:

And so she kept pushing the dark Army and do you remember what she did to Cisco?

Speaker:

No.

Speaker:

So Cisco is a guy, her contact at the Dark Army.

Speaker:

Yeah.

Speaker:

hacked his system, impersonated him their IRC chat channels and

Speaker:

basically is the way that she, uh,

Speaker:

Oh, right, right, right,

Speaker:

to be able to get a meeting on the books with white rose.

Speaker:

right.

Speaker:

was like, don't talk to me.

Speaker:

We're done after this.

Speaker:

I can't believe you hacked me.

Speaker:

So.

Speaker:

Yeah,

Speaker:

No honor amongst ths, I guess.

Speaker:

yeah, yeah.

Speaker:

Um, yeah, that, that, that was, uh, you know, when you're dealing with people

Speaker:

like this that are this, that this good at like, getting into your systems,

Speaker:

uh, kind of all bets are off, I think.

Speaker:

could have benefited from a.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

Uh, it's, um.

Speaker:

Just thinking about, um, you, you know, you know, it's funny, um, I

Speaker:

got, I got, what was her name again?

Speaker:

What's her name?

Speaker:

Darlene,

Speaker:

Darlene.

Speaker:

Yeah.

Speaker:

I got, I got, uh, uh, my wife and I got Darlene this week.

Speaker:

Oh really?

Speaker:

Yeah.

Speaker:

So we got this, uh, this text message from my daughter.

Speaker:

That said, Hey, um, when do you guys, do you guys have time on Sunday to

Speaker:

do stuff for Lily's birthday, right?

Speaker:

were mentioning, yeah.

Speaker:

Yeah.

Speaker:

And so, you know, we worked it out and we, we, we were working it out.

Speaker:

You know, I want to make sure my, my other daughter's there and, and um, and so I

Speaker:

called, I called my daughter and I said.

Speaker:

I was like, Hey, so, you know, um, you know, da da da.

Speaker:

We're try to work this out.

Speaker:

And she's like, you know, I, I work on Sunday, like I work Sunday evening.

Speaker:

She works nights.

Speaker:

She's like, I work Sunday evening.

Speaker:

And I'm like, well, you're the one that sent the text.

Speaker:

And she's like, no, I was not.

Speaker:

I was asleep.

Speaker:

Lily took my phone and sent the message, asked me, when do you guys

Speaker:

want to come over for Lily's birthday?

Speaker:

Oh my gosh.

Speaker:

That girl.

Speaker:

So in, in four hours, we'll be having dinner with Lily, um,

Speaker:

as orchestrated by Marissa.

Speaker:

That is hilarious.

Speaker:

My, my granddaughter, the hacker.

Speaker:

Hmm.

Speaker:

Uh, she got access to her cell phone.

Speaker:

She must know her pin too.

Speaker:

Yeah.

Speaker:

Yeah.

Speaker:

All right.

Speaker:

Well, uh, hopefully you found some inform, you know, you found

Speaker:

some useful information here in our discussion on honeypots.

Speaker:

We're gonna continue talking about this episode in our next week.

Speaker:

Uh, and, uh, I, I think that'll be good as well.

Speaker:

Dun, dun.

Speaker:

Wait to hear, to

Speaker:

Done.

Speaker:

us talk about persistent access.

Speaker:

Yes, absolutely.

Speaker:

All right, well, thanks, Prasanna for having another chat.

Speaker:

Uh, I hope your breathing gets better, Curtis, but you do sound a lot

Speaker:

better than when we first started, so

Speaker:

I don't feel any better.

Speaker:

Um, literally I feel like, like I inhaled chlorine.

Speaker:

Like it's just not, it's not good.

Speaker:

do you still have your scuba tanks with oxygen?

Speaker:

Those don't, those aren't oxygen.

Speaker:

They're just air.

Speaker:

Okay.

Speaker:

You don't put oxygen.

Speaker:

Air,

Speaker:

Don't, don't, don't, don't stay in your lane, buddy and with

Speaker:

that, thanks folks for listening.

Speaker:

Uh, that is a wrap.