Forum Discussion
What is F5 ASM conviction and can it be used for configuring custom URL honey pot trap?
- Jul 12, 2021
This became indeed my Sunday entertainment. I came up with two use cases, which I believe are good:
- Brute Force / Logon Page protection > 302 redirect the malicious actor to a fake site, trick him/her to believe he/she had a successful login. Might be an airgapped copy of your real site. Analyse the malicous actors movement on the fake site.
- Bot Defense > e.g. Bot does a mass sign up on a loyalty program. Make a (slow loading) honey page to trick the bot into believing that it succesfully signed up. Let the hacker exhaust his/her resources.
I'd not use honeypages for each and everything. Hosting them requires extra resources, security measures and time effort.
usually I do feel confident to answer questions regarding Web Application Firewall. I was looking into your question too - I couldn't come up with an answer to this question. At least not for the iRules command.
You can configure custom Honeypot pages for Security Polices / Brute Force Attack Prevention and for Bot Defense profiles. I have learned a lot about Honeypots from Chris Sanders' book "Intrusion Detection Honeypots", but I never configured a honeypage on BIG-IP. Usually I use Blocking Pages or sometimes Captchas (though I don't like them).
A good honeypage could probably help you to gather more intelligence about the attacker.
Might be a nice Sunday project 🙂
My gut feeling - if you want Bot Defense and Credential Stuffing Protection the best results you will get from the Shape products.
Yes but from your reply I see that it probably can not be done with F5 ASM using javascript injection to redirect to a custom URL for the honey pot?
I found the custom honey pages you are mentioning ( https://support.f5.com/csp/article/K18650749 and https://support.f5.com/csp/article/K11412315 ), thanks for the idea. With the custom response pages maybe you are suggesting for me to use and external server for the response pages that will be the honey pot as mentioned in https://support.f5.com/csp/article/K7825 ?
- Daniel_WolfJul 12, 2021MVP
This became indeed my Sunday entertainment. I came up with two use cases, which I believe are good:
- Brute Force / Logon Page protection > 302 redirect the malicious actor to a fake site, trick him/her to believe he/she had a successful login. Might be an airgapped copy of your real site. Analyse the malicous actors movement on the fake site.
- Bot Defense > e.g. Bot does a mass sign up on a loyalty program. Make a (slow loading) honey page to trick the bot into believing that it succesfully signed up. Let the hacker exhaust his/her resources.
I'd not use honeypages for each and everything. Hosting them requires extra resources, security measures and time effort.
- Nikoolayy1Jul 12, 2021MVP
Thanks. I was thinking on using iRule ASM or BOT events like IN_DOSL7_ATTACK
or ASM_REQUEST_DONE or BOTDEFENSE_ACTION
to trigger redirects with HTTP::redirect
or returning javascript like in K7825 with HTTP::respond but better use the native functions that you mentioned.
Recent Discussions
Related Content
* Getting Started on DevCentral
* Community Guidelines
* Community Terms of Use / EULA
* Community Ranking Explained
* Community Resources
* Contact the DevCentral Team
* Update MFA on account.f5.com