Would you like some honey with that?

Abstract

Honeypots have been around for a long time, and while they're providing valuable results when they are configured and deployed correctly, they mosly cover IP addresses and ports. Putting honey into mail, domain names, bitcoins - in fact putting honey wherever possible - broadens the intel we can gather from an attacker. In this talk Stefan will discuss a few ideas how and where honeytokens and other honeystuff can be deployed.

Talk

Stefan Hager

Stefan is a member of the Internet Security team at the software company DATEV eG. When not trying to raise security awareness or researching new threats and their mitigations, he is fiddling around with hardware or trying to beat some hacking challenge. He also writes blog posts (in English and German) on his site cyberstuff.org.