Want to level up your threat-hunting knowledge? Take our FREE, hands-on threat hunt training course: [ Ссылка ]
Video Description: Cyber Deception is a strategy used to attract cyber criminals away from an enterprise’s true assets and divert them to a monitored decoy.
In version 6.0 of AC-Hunter, we added a Cyber Deception module. This module allows for the creation and monitoring of two types of canary tokens. File-access tokens will generate an alert when a designated file has been accessed. User-access tokens will generate an alert when an authentication attempt is made against a monitored user, or a Kerberos ticket is requested for that user.
In this webcast, AC-Hunter developer Logan Lembke will explain why we added this module to AC-Hunter and show you how it works.
Active Countermeasures Socials
Twitter: [ Ссылка ]
LinkedIn: [ Ссылка ]
Discord: [ Ссылка ]
Our Threat Hunting Tool ~ AC-Hunter
Features - [ Ссылка ]
Interactive Demo Space - [ Ссылка ]
Active Countermeasures Open-Source Tools
[ Ссылка ]
Educational Threat Hunting Content
FREE 6-Hour Threat Hunt Training: [ Ссылка ]
Active Countermeasures Blog: [ Ссылка ]
Active Countermeasures YouTube: [ Ссылка ]
Learn Threat Hunting Skills from Antisyphon Training
Entry-Level (Pay-What-You-Can): [ Ссылка ]
Advanced: [ Ссылка ]
Active Countermeasures Shirts
[ Ссылка ]
Our Tribe
Black Hills Infosec: [ Ссылка ]
Wild West Hackin' Fest: [ Ссылка ]
Antisyphon Training: [ Ссылка ]
![](https://i.ytimg.com/vi/lCCBe6D4U6s/maxresdefault.jpg)