https://github.com/1njected/CMLoot
| Pronouns | He/Him/His |
| Website | https://blog.infosecworrier.dk |
| Pronouns | He/Him/His |
| Website | https://blog.infosecworrier.dk |
That's what I'm thinking. Will be exploring the idea/concept with a few customers to see what to make of it. I'll report back when the time is ripe :-)
Occasionally I write some tools and scripts for #security testing purposes, mainly in Python. You can find there here: https://github.com/aatlasis
Among them, Chiron, a security assessment tool for #IPv6.
Trying to figure out the general attitude towards Deception/Honeypots as production level ready systems to glean information about attackers?
I'm personally convinced of the value they could bring when deployed appropriately and leveraged intelligently, i.e used to answer specific questions about potential attackers and their methods.
What's your take?
@singe the idea is very much the same as intelligence led Threat Hunting. Hunting without a purpose is really nothing more than expecting to find evil because you want to.
Hypothesis driven hunting should translate equally well to Deception and Threat Intelligence. What question do you want answered? If you made an assumption about where initial access might occur, deception/Honeypots should ideally be placed close to these assumptions.
Hypothesis driven deception I guess you could say.