Talk With an Expert

Honeytokens and honeypots for web ID and IH

Honeytokens and honeypots for web ID and IH (PDF, 2.60MB)Published: 14 May, 2015
Created by
Rich Graves

Honeypots and honey tokens can be useful tools for examining follow-up to phishing attacks. In this exercise, we respond using valid email addresses that actually received the phish, and wrong passwords. We demonstrate using custom single sign-on code to redirect logins with those fake passwords and any other logins from presumed attacker source IP addresses to a dedicated phishing-victim web honeypot. Although the proof-of- concept described did not become a production deployment, it provided insight into current attacks.

Honeytokens and honeypots for web ID and IH