Monitoring access to honeypot files on Linux
In Linux, there are a couple of ways to go about implementing decoy files to alert the red team of suspicious activities on hosts. The simplest way is probably using the inotifywait
utility. Its use cases in this regard are limited. In this section, we will explore both inotifywait
and auditd
. The latter provides a lot of capabilities. First, let's create some credentials that might trick an adversary.
Creating a honeypot RSA key file
A good deception tactic to trick adversaries or other red teamers is to create fake SSH key files (something such as prod_rsa
). This might trick someone to promptly try to inspect the file as it might appear to give access to production assets. Consider placing the file in a user's ~/.ssh
folder because this is where adversaries will look for credentials.
The following screenshot shows how to use ssh-keygen
to create a keypair: