Тёмный

Honeytokens: Detecting Attacks to Your Web Apps Using Decoys and Deception 

Dana Epp
Подписаться 302
Просмотров 1,3 тыс.
50% 1

This was the presentation I did at the first annual AppSec Pacific Northwest conference. (pnwcon.com)
In this presentation you'll learn how to build into your web apps small “tripwires” that will help you detect if hackers are enumerating your systems, bypassing security controls or otherwise gaining unauthorized access to code, data or infrastructure.
Sometimes called canary tokens, other times honeytokens, these bits of code will help your DevOps, CloudOps and SecOps teams get notified when nefarious activity may be present in your staging and production systems way before they would typically be detected. It can also help with aligning indicators of compromise (IoCs) in your applications with attacker attribution to help your operations team to pinpoint threats much earlier in the attack chain.
In the end, you will have AllTheThings you need to leverage decoys and deception to detect and defend your web applications.
---
Want to get exclusive tips, tricks and killer command line cheats to hack your apps and infrastructure? Join my inner circle at learn.vulscan.... 💎

Опубликовано:

 

5 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 4   
@mohammadhafizhersyah9153
@mohammadhafizhersyah9153 Год назад
Thanks for the video, would you mind sharing several materials regarding deceptive SQL?
@davidmanton8714
@davidmanton8714 3 года назад
Really interesting, thanks for this, definitely something to consider
@bryanhamilton8429
@bryanhamilton8429 3 года назад
Lots of useful info thanks man. Do you have links to more resources for deception in an AD environments?
@DanaEpp
@DanaEpp 3 года назад
Hey Bryan, thanks for the kind words. A great place to start might be the Advanced Threat Analytics suspicious activity guide: docs.microsoft.com/en-us/advanced-threat-analytics/suspicious-activity-guide
Далее
Running a Buffer Overflow Attack - Computerphile
17:30
Blue vs Green Emoji Eating Challenge
00:33
Просмотров 3,3 млн
When you Accidentally Compromise every CPU on Earth
15:59
They Say This Malware is INSANE
51:48
Просмотров 25 тыс.
Social Engineering - How Bad Guys Hack Users
14:58
Просмотров 54 тыс.
Why you’re so tired
19:52
Просмотров 1,5 млн
John Oliver Is Still Working Through the Rage
37:32
Просмотров 1,8 млн
Judge sentences Tina Peters to 9 years behind bars
4:13
Create AWS Honeytokens to catch hackers
24:13
Просмотров 3,2 тыс.
Tactics of Physical Pen Testers
44:17
Просмотров 905 тыс.