2.5 Deception and Disruption Flashcards
(8 cards)
What are honeytraps?
These are deception techniques that allow security defenders to understand attacker behaviour patterns. They all intend to look legitimate to attract attackers
What are the different types of honey traps?
Honeypots, honey nets, honey files, honey tokens
What is a honeypot?
A decoy system E.g. webserver
High-interaction - Is running the application or providing services
Low-interaction - Not running the application or providing services
What is a honeynet?
Is multiple, linked honeypots that simulate a network environment
What is a honeyfile?
A decoy file located on a network. It is designed to detect access and exfiltration attempts
What is a honey token?
A beacon embedded into a document, databases, images, directory and folders
It is used to identify the attacker -> it can track malicious actors and reveal informarion about their identity and methods they used to exploit a system
What are spam traps?
Fake email address used to identify and block spammers. Real mail is unlikely to be sent to a fake address, when an emai is received it is most likely spam
What is a DNA sinkhole?
A DNS server that responds with false results. It is used to redirect malicious internet traffic so that it can be captured and analysed by security analysts
Sinkholes are used to seize control of botnets by interrupting the DNS names of the botnet that is used by malware