The main idea behind Honeypots and Honey Tokens is to lure attackers to use them, letting them think they’re on the right path to achieve privileged credentials or spread through the domain environment. Attackers can study these Honey Tokens / lures and easily avoid them.
Using simple validations that take only a few minutes, an attacker can identify objects that are fake and avoid the trap. The validation of attackers and avoidance of Honey Tokens can be done without triggering any alarm and without authentication or lateral movement.
The Honeypot Buster is an open-source project released in February 2017 to prove that attackers can detect and easily bypass honeypot solutions.
Do you want to get the full version? Contact our professional services. Running the script without a certified Javelin representative could lead to misleading results and present a risk to your network.