Skip to content
  • Categories
  • Recent
  • Tags
  • Popular
  • World
  • Users
  • Groups
Skins
  • Light
  • Brite
  • Cerulean
  • Cosmo
  • Flatly
  • Journal
  • Litera
  • Lumen
  • Lux
  • Materia
  • Minty
  • Morph
  • Pulse
  • Sandstone
  • Simplex
  • Sketchy
  • Spacelab
  • United
  • Yeti
  • Zephyr
  • Dark
  • Cyborg
  • Darkly
  • Quartz
  • Slate
  • Solar
  • Superhero
  • Vapor

  • Default (Cyborg)
  • No Skin
Collapse
Brand Logo

CIRCLE WITH A DOT

  1. Home
  2. Uncategorized
  3. The SSH Key Breadcrumb Trap 🦩

The SSH Key Breadcrumb Trap 🦩

Scheduled Pinned Locked Moved Uncategorized
cybersecurityhoneypotthreatinteldeception
2 Posts 2 Posters 4 Views
  • Oldest to Newest
  • Newest to Oldest
  • Most Votes
Reply
  • Reply as topic
Log in to reply
This topic has been deleted. Only users with topic management privileges can see it.
  • rnbwkat@infosec.exchangeR This user is from outside of this forum
    rnbwkat@infosec.exchangeR This user is from outside of this forum
    rnbwkat@infosec.exchange
    wrote last edited by
    #1

    The SSH Key Breadcrumb Trap 🦩

    Most honeypots have one fatal flaw: they're too clean.
    Empty bash history. Pristine directories. No evidence of actual use. Attackers notice.

    So I plant breadcrumbs. 🤷‍♀️

    Realistic bash history. A private SSH key in .ssh/. History showing SSH connections to "other servers" using that key.

    Those "other servers"? Also honeypots!

    When bots hit my honeypots, they brute force and move on. Boring.
    But when a HUMAN does post-compromise recon, finds that key, and tries to pivot to those other servers?

    Critical Wazuh alert, because only humans do this!!

    Bots don't read history files. They don't hunt for lateral movement opportunities. They don't use found SSH keys.

    Standard attacker tradecraft requires checking for keys and using them. If they skip it, they might miss real opportunities. If they follow it, I know I'm dealing with an actual human threat actor.

    It's a catch-22. And it works beautifully. (And "@sashatheflamingo Approved")
    Full writeup coming to sashatheflamingo.xyz soon!!

    #Cybersecurity #HoneyPot #ThreatIntel #Deception

    heckinteagan@infosec.exchangeH 1 Reply Last reply
    1
    0
    • R relay@relay.infosec.exchange shared this topic
    • rnbwkat@infosec.exchangeR rnbwkat@infosec.exchange

      The SSH Key Breadcrumb Trap 🦩

      Most honeypots have one fatal flaw: they're too clean.
      Empty bash history. Pristine directories. No evidence of actual use. Attackers notice.

      So I plant breadcrumbs. 🤷‍♀️

      Realistic bash history. A private SSH key in .ssh/. History showing SSH connections to "other servers" using that key.

      Those "other servers"? Also honeypots!

      When bots hit my honeypots, they brute force and move on. Boring.
      But when a HUMAN does post-compromise recon, finds that key, and tries to pivot to those other servers?

      Critical Wazuh alert, because only humans do this!!

      Bots don't read history files. They don't hunt for lateral movement opportunities. They don't use found SSH keys.

      Standard attacker tradecraft requires checking for keys and using them. If they skip it, they might miss real opportunities. If they follow it, I know I'm dealing with an actual human threat actor.

      It's a catch-22. And it works beautifully. (And "@sashatheflamingo Approved")
      Full writeup coming to sashatheflamingo.xyz soon!!

      #Cybersecurity #HoneyPot #ThreatIntel #Deception

      heckinteagan@infosec.exchangeH This user is from outside of this forum
      heckinteagan@infosec.exchangeH This user is from outside of this forum
      heckinteagan@infosec.exchange
      wrote last edited by
      #2

      @rnbwkat @sashatheflamingo sounds rad super interested in the write up!

      1 Reply Last reply
      1
      0
      Reply
      • Reply as topic
      Log in to reply
      • Oldest to Newest
      • Newest to Oldest
      • Most Votes


      • Login

      • Login or register to search.
      • First post
        Last post
      0
      • Categories
      • Recent
      • Tags
      • Popular
      • World
      • Users
      • Groups