
Episode 1
Webcast: Getting Started in Cyber Deception
Ever wanted to get started in cyber deception? Ever wanted to do it for free? In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of
February 10, 202059m 21s
Audio is streamed directly from the publisher (media.transistor.fm) as published in their RSS feed. Play Podcasts does not host this file. Rights-holders can request removal through the copyright & takedown page.
Show Notes
Ever wanted to get started in cyber deception? Ever wanted to do it for free?
In this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks.
We will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine.
Download slides: https://www.activecountermeasures.com/presentations/
1:00 – A Few Cool Things
6:00 – Beginnings of Cyber Deception
9:08 – Conversations
16:34 – Canarytokens
18:42 – Scenario: Recon
23:02 – .exe
36:13 – Cloned Websites!
39:07 – Word Docs!!!
47:41 – One Step Forward
51:58 – Honeybadger Update
53:56 – Back To Threat Intel; How BHIS Uses It
56:03 – Questions
This webcast was originally recorded live on January 23, 2020 with John Strand.
Wild West Hackin’ Fest – Most Hands-On Infosec Con!
- (00:00) - Introduction
- (01:00) - A Few Cool Things
- (06:00) - Beginnings of Cyber Deception
- (09:08) - Conversations
- (16:34) - Canarytokens
- (18:42) - Scenario: Recon
- (23:02) - .exe
- (36:13) - Cloned Websites!
- (39:07) - Word Docs!!!
- (47:41) - One Step Forward
- (51:58) - Honeybadger Update
- (53:56) - Back To Threat Intel
- (55:21) - How We Use It
- (56:03) - Questions
Topics
InfosecCybersecuritynews