Honeytokens and honeypots for web ID and IH

Honeypots and honey tokens can be useful tools for examining follow-up to phishing attacks. In this exercise, we respond using valid email addresses that actually received the phish, and wrong passwords. We demonstrate using custom single sign-on code to redirect logins with those fake passwords...
By
Rich Graves
May 14, 2015

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg