Skip to content

Latest commit

 

History

History
26 lines (20 loc) · 1.98 KB

Data_from_local_system.md

File metadata and controls

26 lines (20 loc) · 1.98 KB

Data from Local System

MITRE ATT&CK technique T1005

Tactic: Collection

Platform: Windows, Linux, Mac

Deception Techniques

  • Create fake directories and files (i.e. honeyfiles) and monitor access to them using go-audit, auditd, File Integrity Monitoring (FIM) tool, or the OS file/folder auditing.
  • Create decoy files or documents (beacons) that phone home when opened.
  • Create files containing deceptive content and breadcrumbs to lure the attacker toward your honeypots.
    • Configuration, backup and connection files such as RDP, VPN, and AWS credentials file

Useful Tools

  • honeybits - A tool designed to enhance the effectiveness of honeypots by spreading breadcrumbs & honeytokens across the system. Currently supports creating honeyfiles and several breadcrumbs including fake bash_history entries.
  • go-audit - An alternative to the auditd daemon, with json output.
  • honeyλ - Serverless application designed to create and monitor URL honeytokens (i.e. fake HTTP endpoints) automatically
  • canarytokens

Useful Resources