Skills Development Honeytoken Breach Detection

Honeytoken Breach Detection

v20260317
implementing-honeytokens-for-breach-detection
Deploys honeytokens and canary tokens (fake AWS keys, DNS beacons, documents, DB entries) with webhook alerts to form deception-based early warning systems that detect unauthorized access across critical assets.
Get Skill
339 downloads
Overview

Implementing Honeytokens for Breach Detection

Instructions

Deploy honeytokens across critical systems to detect unauthorized access. Each token type alerts via webhook when triggered by an attacker.

import requests

# Create a DNS canary token via Canarytokens
resp = requests.post("https://canarytokens.org/generate", data={
    "type": "dns",
    "email": "soc@company.com",
    "memo": "Production DB server honeytoken",
})
token = resp.json()
print(f"DNS token: {token['hostname']}")

Token types to deploy:

  1. AWS credential files (~/.aws/credentials) with canary keys
  2. DNS tokens embedded in configuration files
  3. Document beacons (Word/PDF) in sensitive file shares
  4. Database honeytoken records in user tables
  5. Web bugs in internal wiki/documentation pages

Examples

# Generate a fake AWS credentials file with canary token
aws_creds = f"[default]\naws_access_key_id = {canary_key_id}\naws_secret_access_key = {canary_secret}\n"
with open("/opt/backup/.aws/credentials", "w") as f:
    f.write(aws_creds)
Info
Category Development
Name implementing-honeytokens-for-breach-detection
Version v20260317
Size 8.2KB
Updated At 2026-03-18
Language