Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Effortless, Agentless Breach Detection in the Enterprise - Token All the Things!

44CON Information Security Conference via YouTube

Overview

Discover innovative techniques for effortless, agentless breach detection in enterprise environments through the use of honeytokens. This 49-minute conference talk from the 44CON Information Security Conference, presented by Azhar Desai and Nicholas Rohrbeck, explores the evolution and implementation of Canarytokens. Learn about the various types of tokens, including web bugs, DNS tripwires, SQL row tokens, and document tokens, and how they can be deployed quickly and easily through a simple web interface. Gain insights into new methods for setting tripwires around your network without the need for agent installation, hardware deployment, or additional costs. Explore advanced techniques such as abusing native OS functionality, leveraging cloud infrastructure, and employing file format chicanery to enhance breach detection capabilities. Discover practical defensive hacks and strategies to improve your organization's security posture and detect potential breaches more effectively.

Syllabus

Effortless, Agentless Breach Detection in the Enterprise: Token all the Things!

Taught by

44CON Information Security Conference

Reviews

Start your review of Effortless, Agentless Breach Detection in the Enterprise - Token All the Things!

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.