Narayana M V Lblog.macrofiy.com·Jan 5, 2024Stop Spam Bots in Their Tracks: The Essential Guide to Email Validation and HoneypotsIn the digital landscape, contact forms are gateways to valuable leads. But these portals can also become entry points for spam bots and unwanted submissions, clogging your inbox and draining your time. To combat this, two valiant knights stand guard...Discusscontact form
Alexey Cherkashinblog.goodniceweb.me·Nov 9, 2023Review of Ruby on Rails Documentary by HoneypotI've just finished watching the premiere of the Rails documentary. Excited to be one of the first viewers. I must admit the high quality of all the videos made by Honeypot. No doubt, they are like Netflix in the programming world. I've been working w...Discuss·2 likes·284 readsRails
theoreticalhacker09theoreticalhacker09.hashnode.dev·Oct 9, 2023Trap Of The HoneypotA honeypot is a strategically crafted system, either physical or virtual, designed to deceive and detect unauthorized activity. These deceptive systems act as a lure for malicious actors, providing security professionals with valuable insights into p...DiscussHoneypot
Goodycybgoodycyb.hashnode.dev·Aug 30, 2023Lab 3: Attacking the Cloud AccountLab Objective You will act as an attacker in the following ways to generate log data, which will help build your detection and automation: Perform discovery of S3 resources - ATT&CK Technique T1619 (Cloud Storage Object Discovery) Download an inte...Discuss·30 readsAWS
Jonathan CilleyProjonathancilley.hashnode.dev·Aug 21, 2023Adventures in Running a Honeypot HiveLately, I have been working on one of the more fun hobby projects that I have decided to attempt. Since I spend a lot of my day thinking about and managing information security processes and tools, I thought going through the exercise of setting up m...Discuss·123 readsHoneypot
Kamil Gierach-Pacanekblog.cyberethical.me·May 22, 2023I've asked ChatGPT to write a honeypotIntroduction Honeypots are decoy systems that mimic real targets and lure attackers into revealing their techniques and intentions. In this article, we will explore how to create honeypots using various tools and methods, and how to analyze the data...Discuss·342 reads#cybersecurity
Soujanya AinforGitGuardiangitguardian.hashnode.dev·Apr 20, 2023Launching GitGuardian Honeytoken: your powerful ally to detect any breaches in the supply chain!Today, after months of hard work and discovery with security teams, we are excited to launch the new Honeytoken module to protect your software supply chain against attackers targeting Source Control Management (SCM) systems, Continuous Integration, ...Discuss·30 readssoftware-supply-chain-security
prg skids trgskids.hashnode.dev·Apr 3, 2023Uncovering Self-Proclaimed Korean Hackers' Use of Social Engineering and Fake 0-Days to Hack "Researchers"Informed by T1G I was enjoying my morning when I was prompted by T1G (alias) regarding a self-proclaimed Korean hacking group that managed to hack a "Security Researcher" in February. While I was not overly interested, I was curious about what had ha...Discuss·195 readskorea
Dwayne McDanielforGitGuardiangitguardian.hashnode.dev·Feb 24, 2023Intrusion Detection Through Cyber Deception: Disrupting Attacks With An Active DefenseWe should do our best to ensure our network and pipeline perimeters are secure and make it hard for attackers to gain access. However, the reality is that intruders will stop at nothing to gain access, as evidenced by the Uber, CircleCI, and Dropbox ...Discuss·41 readsHoneypot
Abiodun Awoyemiaagbotemi.hashnode.dev·Jan 14, 2023Solidity Attack Vectors #8 - HoneypotA honeypot is a smart contract that purports to leak cash to an arbitrary user due to a clear vulnerability in its code in exchange for extra payments from that user. A honeypot is a trap to catch hackers. Combining two exploits, reentrancy and hidin...Discuss·63 readsSmart Contracts