Get A DemoContact Us
Request a Demo
NUMBER OF EMPLOYEES
FEDERAL ENTITY
COUNTRY
I'M INTERESTED IN
 
 
Honeypot Buster,
Detect Honeypots and Lures Empower Red Teams

The main idea behind Honeypots and Honey Tokens is to lure attackers to use them, letting them think they’re on the right path to achieve privileged credentials or spread through the domain environment. Attackers can study these Honey Tokens / lures and easily avoid them.

Using simple validations that take only a few minutes, an attacker can identify objects that are fake and avoid the trap. The validation of attackers and avoidance of Honey Tokens can be done without triggering any alarm and without authentication or lateral movement.

 
Introducing
Honeypot Buster
Detects:
  • Kerberoasting Service Accounts Honey Tokens
  • Fake Computer Accounts Honey Pots
  • Fake Domain Admins Accounts Honey Tokens
  • Fake Memory Credentials Honey Tokens
  • Fake Credentials Manager Credentials Breadcrumbs
  • Fake Mapped Drives Breadcrumbs
  • DNS Records Manipulation Honey Pots

Technical Features:
  • Powershell Only, Supports version 2+
  • Windows 7 and above
  • Active Directory Environment
  • Remote Capabilities using WinRM
Go ahead. Smash those honeypots.
 
Download Honeypot Buster
Ready to bust some honeypots? Fill out the form, and we’ll send you the download directly. Good luck!
FEDERAL ENTITY
COUNTRY
 
 
Request a Demo
NUMBER OF EMPLOYEES
FEDERAL ENTITY
COUNTRY
I'M INTERESTED IN