|
- Canarytokens
Canarytokens is a free tool that helps you discover you’ve been breached by having attackers announce themselves The tokens allow you to implant traps around your network and notifies you as soon as they are triggered
- Getting Started - Canarytokens
Official docs for CanarytokensGetting Started How Canarytokens work (in 3 short steps) Go to canarytokens org and select your Canarytoken (supply an email to be notified at as well as a memo that reminds you which Canarytoken this is and where you put it) Place the generated Canarytoken somewhere special (read the examples for ideas on where) If an attacker ever trips on the Canarytoken
- Introduction - Canarytokens
Official docs for CanarytokensIntroduction What are Canarytokens Canarytokens are like motion sensors for your networks, computers and clouds You can put them in folders, on network devices and on your phones Place them where nobody should be poking around and get a clear alarm if they are accessed They are designed to look juicy to attackers to increase the likelihood that they are opened
- DNS Canarytoken | Canarytokens
Official docs for CanarytokensDNS Canarytoken What is a DNS Canarytoken When you create a DNS based Canarytoken, the system gives you a unique Internet resolvable domain name Anyone attempting to resolve this domain name, will now trigger an alert Why does this matter? Once you are able to get an alert for a web-based Canarytoken, or a DNS based Canarytoken, you have the building blocks for
- Canarytokens
Completely free Tokens you deploy through canarytokens org are free (and will remain free!)
- How to use the examples - Canarytokens
Official docs for CanarytokensHow to use the examples In this section we will walk through the different available Canarytokens For each of them, we will describe what they are used for, and how you can go about creating deploying your own ones
- Cloned Website Canarytoken | Canarytokens
Official docs for CanarytokensCloned Website Canarytoken What is a Cloned Website Canarytoken This Canarytoken is placed within the JavaScript of your websites and notifies you if someone clones your site and hosts it on another domain (This is often used for targeted Phishing attacks ) Creating a Cloned Website Canarytoken Create a Canarytoken by choosing "JS Cloned Website" from the
- HTTP Canarytoken | Canarytokens
Official docs for CanarytokensHTTP Canarytoken What is an HTTP Canarytoken When you create a HTTP based Canarytoken, the system gives you a URL Anyone attempting to browse to this URL will generate an alert Why does this matter? Once you are able to get an alert for a web-based Canarytoken, or a DNS based Canarytoken, you have the building blocks for squillions of possible tripwires
|
|
|