YoVDO

Baited Canaries - Monitoring Attackers With Active Beacons

Offered By: BSidesLV via YouTube

Tags

Security BSides Courses Cybersecurity Courses Javascript Courses

Course Description

Overview

Explore active beacon techniques for monitoring attackers in this 25-minute conference talk from BSidesLV 2019. Delve into the concept of canaries and their application in cybersecurity, focusing on phishing sites and attack scenarios. Learn about JavaScript canaries, DNS prefetch, and their constraints. Discover additional functionalities, nonce payloads, and typical timelines for these monitoring methods. Examine G Suite permissions, Google Doc phishing, and the use of bait files. Gain insights into Drive audits, alerts, and token reports. Review key concepts and understand the best practices for implementing active beacons to enhance your organization's security posture against phishing attacks.

Syllabus

Introduction
The Problem
What Are Canaries
Phishing Sites
Attack Scenario 1
JavaScript Canaries
DNS Prefetch
Constraints
Additional Functionality
Nonce
Payload
Typical Time Line
The Best Way
G Suite Permissions
Google Doc Fishing
Bait Files
Drive Audit
Drive Alert
Token Report
Review
Conclusion
Special Thanks
Phishing


Taught by

BSidesLV

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network