Explore early detection techniques through deception in cybersecurity with Jason Nester's 57-minute conference talk from BSides Cleveland 2019. Delve into the concept of deception, its advantages and challenges, and practical implementation strategies. Learn about various deceptive scenarios, including foreign devices on networks, compromised trusted systems, and internet manipulation. Discover advanced deception tactics like honey badger systems, deceptive metadata, and countering spear-phishing attempts. Gain insights into the ongoing cat-and-mouse game between attackers and defenders, and participate in a Q&A session to further enhance your understanding of this critical cybersecurity approach.
Overview
Syllabus
Intro
What is Deception?
All Rainbows and Unicorns?
Before You Begin...
Gimme Some Examples
Foreign Device on Network
Compromised Trusted System
Messing With the Internet
MOAR DECEPTION
For Example...
Honey Badger Don't Give A...
Deceptive Metadata
Spear-phishing / Credential Theft
The Cat and Mouse Game Continues
Questions?