Honeytokens: The Other Honeypot

by Lance Spitzner
Sept. 25, 2017 1 comment Symantec Detection & Response honeytokens

The purpose of this series of honeypot papers is to cover the breadth of honeypot technologies, values and issues. I hope by now readers are beginning to understand that honeypots are an incredibly powerful and flexible technology. They have multiple applications to security, everything from simplified detection to advanced information gathering. Today we extend the capabilities of honeypots even further by discussing honeytokens. Honeytokens are everything a honeypot is, except they are not a computer.


2flash 7 months, 4 weeks ago

That moment when Honeypot was already too famous and something new was urgently needed :)