Пожалуйста, обратите внимание, что пользователь заблокирован
what is the best option to find decoy in network , or what is the best tool to detect them ?
this traps used by blue team to catch red team or attackers in networkWhat do you mean decoy?
i know about this ...my question is about something in network like user honeypot
HoneypotBuster is old option at this time and for the real worldAs far as I know there is no specific tool to find honeypots but you can try this. Maybe you can share your "methods" to find honeypots so we can understand what you don't know or what we can help you to improve?
Usual methods, try to gather as much information about all users as you can and try to get some patterns, honeypots should breaks this patterns. Simple example: Users change their passwords every 30 days, the honeypot never changed its password.
Also look for:
- ObjectSID (it can be different from others SID)
- lastLogon, LogonCount
- Badpwdcount (this is very good pointer to real users vs fake ones)
ObjectSID option is good also let me tell you there is paid tools to make honeypot users etcAs far as I know there is no specific tool to find honeypots but you can try this. Maybe you can share your "methods" to find honeypots so we can understand what you don't know or what we can help you to improve?
Usual methods, try to gather as much information about all users as you can and try to get some patterns, honeypots should breaks this patterns. Simple example: Users change their passwords every 30 days, the honeypot never changed its password.
Also look for:
- ObjectSID (it can be different from others SID)
- lastLogon, LogonCount
- Badpwdcount (this is very good pointer to real users vs fake ones)
I agree with thatI gues even if you pay them no one will tell you about his mthode with decoys
you can't learn this by paid courses , you get this only by experience in the real worldSome tools will also use tricks like polluting lsass memory. So if you try use the dumped hashes it will alert. They fill the network with fake hosts and objects that staff will never use or see.
To survive you will need to work slowly and carefully. Even if passive, if you do too much at once it could still alert. Use their tools to look at account details like the last logon, group memberships and password changes. See if the account name also exists in their mail. If created by a tool you may also see many made at the same time and their details may look fake. Review event logs, qwinsta, netstat, etc to see what accounts are being used and where. Limit your actions to only what you know is real.