Improvised Electronic Deception

Running list and bibliography of articles on cyber deception, honeypots, and canary tokens. Started as notes and discussion from my talk given at Toorcamp 2009.

Followers

Blog Archive

  • ▼  2023 (1)
    • ▼  January (1)
      • Canary credit cards
  • ►  2022 (4)
    • ►  May (2)
    • ►  January (2)
  • ►  2021 (4)
    • ►  November (1)
    • ►  October (1)
    • ►  May (1)
    • ►  January (1)
  • ►  2018 (7)
    • ►  August (4)
    • ►  March (1)
    • ►  February (1)
    • ►  January (1)
  • ►  2017 (4)
    • ►  November (2)
    • ►  September (1)
    • ►  March (1)
  • ►  2016 (1)
    • ►  November (1)
  • ►  2015 (2)
    • ►  May (1)
    • ►  February (1)
  • ►  2014 (1)
    • ►  August (1)
  • ►  2013 (3)
    • ►  May (1)
    • ►  April (2)
  • ►  2009 (3)
    • ►  July (3)

About Me

My photo
Planet Heidi
About Me
View my complete profile

Friday, August 17, 2018

Article I wrote on F5 Labs

How to Hack Back Using Deception—Part 1 

https://www.f5.com/labs/articles/cisotociso/how-to-hack-back-using-deception-part-1.html



https://www.f5.com/labs/articles/cisotociso/how-to-hack-back-using-deception-part-1.html

Posted by Planet Heidi at 10:06 AM No comments:

Friday, March 30, 2018

Infosec Institute: File Decoys for Endpoints


Honey tokens on the endpoints -

File Decoys for Endpoints

Posted by Planet Heidi at 7:59 AM No comments:

Tuesday, February 27, 2018

Deception in the news again


Misleading Cyber Foes with Deception Technology


Deception Technology: Worth the Investment?
Posted by Planet Heidi at 2:29 PM No comments:

Tuesday, January 30, 2018

Deception based detection techniques mapped to the MITRE’s ATT&CK framework

Interesting set of tools

Deception based detection techniques mapped to the MITRE’s ATT&CK framework 

https://github.com/0x4D31/deception-as-detection

And a great list of additional materials on deception

Posted by Planet Heidi at 12:23 PM No comments:

Thursday, November 9, 2017

Nice blog post on deception by Lenny Zeltser


Reflections Upon Deception-Based Security Tactics



https://blog.minerva-labs.com/reflections-upon-deception-based-security-tactics

Posted by Planet Heidi at 4:51 AM No comments:

Wednesday, November 8, 2017

Creating deceptive AD entries


Honey Accounts


https://jordanpotti.com/2017/11/06/honey-accounts/

Nice how-to
Posted by Planet Heidi at 6:28 AM No comments:

Wednesday, September 13, 2017

Pretend to be a honeypot to deter malware

Someone's gone forward with an idea I kicked around a few years ago.  Nice.


Anti-Honeypot – Repelling Attackers Using Fake Indicators

https://securityboulevard.com/2017/09/anti-honeypot-repelling-attackers-using-fake-indicators/
Posted by Planet Heidi at 4:12 AM No comments:
Newer Posts Older Posts Home
Subscribe to: Comments (Atom)