Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover innovative techniques for effortless, agentless breach detection in enterprise environments through the use of honeytokens. This 49-minute conference talk from the 44CON Information Security Conference, presented by Azhar Desai and Nicholas Rohrbeck, explores the evolution and implementation of Canarytokens. Learn about the various types of tokens, including web bugs, DNS tripwires, SQL row tokens, and document tokens, and how they can be deployed quickly and easily through a simple web interface. Gain insights into new methods for setting tripwires around your network without the need for agent installation, hardware deployment, or additional costs. Explore advanced techniques such as abusing native OS functionality, leveraging cloud infrastructure, and employing file format chicanery to enhance breach detection capabilities. Discover practical defensive hacks and strategies to improve your organization's security posture and detect potential breaches more effectively.