Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. My logs were full of attackers probing for secrets.

My logs were full of attackers probing for secrets.

Scheduled Pinned Locked Moved Uncategorized
mirecybersecuritydevsecops
4 Posts 2 Posters 0 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • securilee@infosec.exchangeS This user is from outside of this forum
    securilee@infosec.exchangeS This user is from outside of this forum
    securilee@infosec.exchange
    wrote last edited by
    #1

    My logs were full of attackers probing for secrets. Now, they’re just wasting their own money.

    Introducing MIRE/C³: A deception layer designed to drain attacker resources and trigger immediate alerts via canary decoys.

    Let them in. They’ll never find the way out. 🕸️

    Try it for yourself:
    https://cfd.mire.cc/cfdemo.html
    #MIRE #CyberSecurity #DevSecOps

    Link Preview Image
    ryanb@infosec.exchangeR 1 Reply Last reply
    0
    • securilee@infosec.exchangeS securilee@infosec.exchange

      My logs were full of attackers probing for secrets. Now, they’re just wasting their own money.

      Introducing MIRE/C³: A deception layer designed to drain attacker resources and trigger immediate alerts via canary decoys.

      Let them in. They’ll never find the way out. 🕸️

      Try it for yourself:
      https://cfd.mire.cc/cfdemo.html
      #MIRE #CyberSecurity #DevSecOps

      Link Preview Image
      ryanb@infosec.exchangeR This user is from outside of this forum
      ryanb@infosec.exchangeR This user is from outside of this forum
      ryanb@infosec.exchange
      wrote last edited by
      #2

      @SecuriLee Did you create this? It looks pretty cool!

      securilee@infosec.exchangeS 1 Reply Last reply
      0
      • ryanb@infosec.exchangeR ryanb@infosec.exchange

        @SecuriLee Did you create this? It looks pretty cool!

        securilee@infosec.exchangeS This user is from outside of this forum
        securilee@infosec.exchangeS This user is from outside of this forum
        securilee@infosec.exchange
        wrote last edited by
        #3

        Hi @RyanB
        Yes, I created it.
        The potted history....I brought up a subdomain and saw hits after 5 seconds. "This can't be right," I said to myself. Thank you, certificate transparency.
        And then they scraped.
        I countered with robots.txt
        They ignored it 😂
        So I examined what they were trying to get and designed a way to fulfil their requests. Fake tokens, dodgy ZIPs, #CanaryTokens
        And that's how the thing was born, now I polish it up.

        The goal? Synthesise delays, synthesise content. Waste hacker time.

        I think I like it too 👍

        ryanb@infosec.exchangeR 1 Reply Last reply
        1
        0
        • R relay@relay.infosec.exchange shared this topic
        • securilee@infosec.exchangeS securilee@infosec.exchange

          Hi @RyanB
          Yes, I created it.
          The potted history....I brought up a subdomain and saw hits after 5 seconds. "This can't be right," I said to myself. Thank you, certificate transparency.
          And then they scraped.
          I countered with robots.txt
          They ignored it 😂
          So I examined what they were trying to get and designed a way to fulfil their requests. Fake tokens, dodgy ZIPs, #CanaryTokens
          And that's how the thing was born, now I polish it up.

          The goal? Synthesise delays, synthesise content. Waste hacker time.

          I think I like it too 👍

          ryanb@infosec.exchangeR This user is from outside of this forum
          ryanb@infosec.exchangeR This user is from outside of this forum
          ryanb@infosec.exchange
          wrote last edited by
          #4

          @SecuriLee Very nice!

          1 Reply Last reply
          1
          0
          Reply
          • Reply as topic
          Log in to reply
          • Oldest to Newest
          • Newest to Oldest
          • Most Votes


          • Login

          • Login or register to search.
          • First post
            Last post
          0
          • Categories
          • Recent
          • Tags
          • Popular
          • World
          • Users
          • Groups