My logs were full of attackers probing for secrets.
-
My logs were full of attackers probing for secrets. Now, they’re just wasting their own money.
Introducing MIRE/C³: A deception layer designed to drain attacker resources and trigger immediate alerts via canary decoys.
Let them in. They’ll never find the way out.
️Try it for yourself:
https://cfd.mire.cc/cfdemo.html
#MIRE #CyberSecurity #DevSecOps
-
My logs were full of attackers probing for secrets. Now, they’re just wasting their own money.
Introducing MIRE/C³: A deception layer designed to drain attacker resources and trigger immediate alerts via canary decoys.
Let them in. They’ll never find the way out.
️Try it for yourself:
https://cfd.mire.cc/cfdemo.html
#MIRE #CyberSecurity #DevSecOps
@SecuriLee Did you create this? It looks pretty cool!
-
@SecuriLee Did you create this? It looks pretty cool!
Hi @RyanB
Yes, I created it.
The potted history....I brought up a subdomain and saw hits after 5 seconds. "This can't be right," I said to myself. Thank you, certificate transparency.
And then they scraped.
I countered with robots.txt
They ignored it
So I examined what they were trying to get and designed a way to fulfil their requests. Fake tokens, dodgy ZIPs, #CanaryTokens
And that's how the thing was born, now I polish it up.The goal? Synthesise delays, synthesise content. Waste hacker time.
I think I like it too

-
R relay@relay.infosec.exchange shared this topic
-
Hi @RyanB
Yes, I created it.
The potted history....I brought up a subdomain and saw hits after 5 seconds. "This can't be right," I said to myself. Thank you, certificate transparency.
And then they scraped.
I countered with robots.txt
They ignored it
So I examined what they were trying to get and designed a way to fulfil their requests. Fake tokens, dodgy ZIPs, #CanaryTokens
And that's how the thing was born, now I polish it up.The goal? Synthesise delays, synthesise content. Waste hacker time.
I think I like it too

@SecuriLee Very nice!