BHIS PODCAST: Tracking attackers. Why attribution matters and how to do it.

In this BHIS podcast, originally recorded as a live webcast, we cover some new techniques and tactics on how to track attackers via various honey tokens.  We cover how to track with Word Web Bugs in ADHD, and cover the awesome toolkit from Thinkst. 

We also cover some of the legal ramifications involved in doing this.

Download slides: https://www.activecountermeasures.com/presentations/

I am covering this for a couple of reasons. First, there are a lot of companies who are selling cyber deception in the form of honeypots, which is cool – but not near enough for attribution. Also, it is time to start gearing up for Black Hat. We are teaching our Cyber Deception class again and I figure as I update the slides, I can get them out as a webcast for you!

This podcast was originally recorded as a webcast live on 2/28/2019.

Download ADHD here: https://www.blackhillsinfosec.com/projects

Also, you can now register for our Cyber Deception class at Black Hat 2019 here: https://www.blackhat.com/us-19/training/schedule/index.html#a-guide-to-active-defense-cyber-deception-and-hacking-back-1412

Join the BHIS Blog Mailing List – get notified when we post new blogs, webcasts, and podcasts.

Join 1,617 other subscribers