top of page
Honeypots


What’s the worst place to leave your secrets? – Research into what happens to AWS credentials that are left in public places
<p>TL;DR I deployed canary tokens in various public places on the Internet, logged all access attempts, and discovered intriguing patterns on credential discovery and attack methodologies of threat actors. Canary Tokens Primer Canary tokens are a type of digital tripwire designed to detect unauthorized access or activity within a system. They work by embedding seemingly […]</p>
idan ba
Aug 8, 202412 min read
bottom of page

