Used to make our own fake credit card numbers with the Luhn algorithm and then manually code the card into our IDS signatures.
But now it's productizied for your convenience
Running list and bibliography of articles on cyber deception, honeypots, and canary tokens. Started as notes and discussion from my talk given at Toorcamp 2009.
Used to make our own fake credit card numbers with the Luhn algorithm and then manually code the card into our IDS signatures.
But now it's productizied for your convenience
https://queue.acm.org/detail.cfm?id=3494836