Free Honey Tokens for Breach Detection – No Signup
Howdy folks – former red teamer (a lot of my work is available under the rad9800 alias, if you’re interested in malware – check it out!) now building the product to catch me/and in turn the many other adversaries running the same playbooks. We offer a paid deception platform, but I wanted to make a free tier actually useful. What’s free: AWS Access Keys (10) AWS Bedrock Keys (2) S3 Bucket tokens (2) SSH Private Keys (20) No credit card, no trial expiry. Just drop your email, get credentials, plant them where they shouldn’t be touched. We have 12 other token types in the paid version, and will slowly expand these out in this edition depending on feedback/and increasing limits based on what’s being used/what folk want. Additionally – something unique about our AWS Access Keys in particular you can specify the username and they’re allocated from a pool of 1000s of accounts so they’re hard/impossible to fingerprint (prove me wrong, I’ll be curious). When someone uses them, you get an alert (via email, which is why we need your email – else we wouldn’t!) with: Source IP + geolocation ASN/org lookup VPN/Tor/proxy detection User agent Timestamp Any additional unstructured event metadata Why these token types? They’re the ones I’d actually look for on an engagement. Hardcoded AWS creds in repos, SSH keys in backup folders, that .env file someone forgot to gitignore. If an attacker finds them, you want to reveal these internal breaches. I’ve written one or two blogs about “Read Teaming” and the trend (and more than happy to chat about it) No catch? The catch is I’m hoping some of you upgrade when you need more coverage/scale and/or feedback on this! But the free tier isn’t crippled – it is very much the same detection pipeline we use for paying customers! Link: https://starter.deceptiq.com More than happy/excited to answer questions about the detection methodology or token placement strategies. submitted by /u/radkawar [link] [comments]Technical Information Security Content & DiscussionRead More