Focused On Your Success


Deception Toolkit V0.5


DTK V0.5

DTK Version 0.5 improves the InfoCon capability by allowing the response file to specify infocon levels directly and adding syslog support as a logging option.

It also adds deceptions for Back Orafice and NetBus Windows attacks amd improves the generation of one-time-pads by not regenerating pads if a one-time-pad already exists.


How to do it:

Infocon levels can be set explicitly from within any response script by prepending I? to the CRLF field where the ? is any digit (0..9). For example, I60 indicates infocon level is set to 6 and CRLF is treated as if it were '0'.

Syslog support is used by specifying Y (sYslog) as the audit option in the Configure program.

Back Orafice and NetBus deceptions correspond to ports now added to the dtk.rc.local file. On system reboot, this file is normally executed and the deceptions are engaged.

One-time-pad generation improvements are transparent upon use of Configure to configure DTK.


From DTK V0.4

DTK Version 0.4 enhances DTK's functionality by providing capabilities for one-time passwords and algorithmic passwords to modify access controls (for example, an authorized user from the Internet can tell a deception to turn off and the real service to turn on), for access controls to be altered by other state transition (such as access being automatically removed to all services for an attacker who has gained a password file), and logging of the last change in the identified threat level (the InfoCon). The InfoCon state, as well as the history of the DTK log file can be remotely fetched using the decption port (365) or other deception services.


From DTK V0.3

DTK V0.3 is a substantially improved and enhanced version of DTK. It enhances previous deception techniques by adding automated programmable response capabilities that permit automated reconfiguration of systems when under attack, remote retrieval of deception logs from networked hosts to allow for big-picture detection and analysis of attack patterns, it includes better installation for more common operating environments, and it has a new database interface to allow logfile information to be placed into and analyzed in a database pogram.

DTK V0.3 is freely available for individual and research use and may be inexpensively licensed for corporate or government use. It can be distributed and redistributed without royalty, provided that all copyright notices are left in tact and no corporate or for-profit use is made of it. There is one non-corporate exception to this free license to use DTK. Anybody that uses it to attack systems or find weaknesses for others to exploit or does anything else with DTK that tends to produce inconvenience for non-attackers, is required to pay a royalty of US$250 per copy to me - including a fee, of course, for each updated copy, backup copy, other copy made, copy seen, used, or whatever else. Crime costs.

Those who use and like DTK for defense are encouraged to send $3 per computer with DTK installed (or more if you really like it a lot) to me (check or money order would do nicely) to support this good work, or to send improvements and updates, deception scripts that detect new attacks, and so forth. If they are useful, we will include them - subject of course to the same copyrights, terms, and conditions used in the rest of DTK.

The official home of DTK is at http://all.net. Comments are invited (send nice things to fc@all.net - complaints and harassment go to nobody@nowhere.org).


New in DTK V0.3

New features in version 0.3 include:
DTK V0.2
Augments DTKv0.1 to add deception for most of the commonly used services (telnet, ftp, smtp, chargen, daytime, NTP, finger, http, gopher, and others). It also has an easier installation procedure and several other enhancements that you can read about below. DTK is increasingly effective at reducing the threat from 90% of today's attackers.

New in DTK V0.2

New features in version 0.2 include: