Nowadays, web applications have become most prevalent in the industry, and the critical data of most organizations stored using web apps. Hence, web applications a much bigger target for diverse cyber-attacks, which varies from database injections-SQL injection, PHP object injection, template injection, XML external entity injection, unsanitized input attacks- Cross-Site Scripting(XSS), and many more. As mitigation for them, among many proposed solutions, web application honeypots are a much sophisticated and powerful protection mechanism. In this paper, we propose a low interaction, adaptive, and dynamic web application honeypot that imitates the vulnerabilities through HTTP events. The honeypot is built with SNARE and TANNER; SNARE creates the attack surface and sends the requests to TANNER, which evaluates them and decides how SNARE should respond to the requests. TANNER is an analysis and classification tool, which analyzes and evaluates HTTP requests served by SNARE and to compose the response, it is powered by emulators, which are engines used for the emulation of vulnerabilities.
翻译:目前,网络应用在行业中最为普遍,大多数组织使用网络应用程序储存的关键数据也最为普遍。因此,网络应用对于各种网络攻击的目标要大得多,这与数据库注入SQL注射、PHP物体注射、模板注射、XML外部实体注射、不卫生的投入攻击-跨Site Sripting(XSS)等不同。作为缓解措施,网络应用蜂蜜罐是一个非常复杂和强大的保护机制。在本文中,我们提出了一个通过HTTP事件模仿脆弱性的低互动、适应性和动态网络应用蜂蜜罐。蜂蜜罐与SNARE和TANNER一起建造;SNARE创造了攻击表面,向TANNER发出请求,后者评估了攻击面,并决定SNARE应如何响应这些请求。 TANNER是一个分析和分类工具,用来分析和评估SNARE所服务HTTP的要求,并进行响应。