Deception and Disruption Flashcards
Security+
What is the primary purpose of a honeypot?
To attract and trap attackers, often machines, in a virtual environment.
How does a honeypot contribute to recon?
It allows observation and analysis of the attacker’s behavior and methods.
What types of resources can a honeynet include?
Servers, workstations, routers, switches, and firewalls.
What is a honeynet?
A network of multiple honeypots that create a larger deception environment.
Why are honeynets beneficial?
They provide more sources of information and can create complex traps for attackers.
What is the purpose of a honeyfile?
To attract attackers with fake files containing enticing information.
How does a honeyfile work?
It acts as bait; alerts are sent when the file is accessed by an attacker.
What is an example of a honeyfile?
A file named “passwords.txt” that is likely to attract attention.
What are honeytokens used for?
To track malicious actors through traceable data added to the honeynet.
How do API credentials function as honeytokens?
They send notifications when used but do not grant actual access.
What is a practical example of a honeytoken?
A fake email address added to a contact list for monitoring purposes.
How can honeytokens help in cybersecurity?
They provide insight into where data breaches originate if the tokens are stolen.
What types of honeytokens can be used?
Database records, browser cookies, web page pixels, and more.