Source: Black Hills Information Security, Inc.
Author: BHIS
URL: https://www.blackhillsinfosec.com/deceptive-auditing/
ONE SENTENCE SUMMARY:
Deceptive-Auditing deploys and audits Active Directory honeypots, integrating multiple functions to automate setup and enhance security defenses.
MAIN POINTS:
- Deceptive-Auditing automates Active Directory honeypot deployment using PowerShell cmdlets.
- It combines two projects: Set-AuditRule and Deploy-Deception by Rodriguez and Mittal.
- Automates creation/removal of ACEs in a SACL for file auditing.
- Supports auditing for files, registry keys, and AD objects.
- Functions like New-DecoyUser and Deploy-UserDeception create and audit decoy users.
- Deploy-PrivilegedUserDeception establishes privileged honeypots with simulated activity.
- New-DecoyComputer and Deploy-ComputerDeception manage deceptive computer setups.
- New-DecoyGroup and Deploy-GroupDeception create and manage decoy groups.
- Includes functions like New-DecoyOU and Deploy-OUDeception for organizational units.
- New-DecoyGPO and Deploy-GPODeception manage group policy objects for decoy purposes.
TAKEAWAYS:
- Handles deceptive traps in Active Directory to bait adversaries.
- Supports creating scripts for ongoing honeypot deployments.
- Offers mechanisms to simulate and entice malicious activity.
- Automates Active Directory lab environment setup with fake objects.
- Extensible for future functions and detailed defensive strategies.