{"type":"rich","version":"1.0","provider_name":"Transistor","provider_url":"https://transistor.fm","author_name":"Talkin' Bout [Infosec] News","title":"Webcast: Getting Started in Cyber Deception","html":"<iframe width=\"100%\" height=\"180\" frameborder=\"no\" scrolling=\"no\" seamless src=\"https://share.transistor.fm/e/5c520e56\"></iframe>","width":"100%","height":180,"duration":3561,"description":"Ever wanted to get started in cyber deception? Ever wanted to do it for free? \n\n\n\nIn this BHIS webcast, we will cover some basic, legal, and easy tools/techniques to get you started in working with low interaction honeypots to serve as an early warning of attacks. \n\n\n\nWe will also be sharing a recipe for making wine out of pentester tears. Because attacker tears make the best wine. \n\n\n\nDownload slides: https://www.activecountermeasures.com/presentations/\n\n\n\n1:00 – A Few Cool Things \n\n\n\n6:00 – Beginnings of Cyber Deception \n\n\n\n9:08 – Conversations \n\n\n\n16:34 – Canarytokens \n\n\n\n18:42 – Scenario: Recon \n\n\n\n23:02 – .exe \n\n\n\n36:13 – Cloned Websites! \n\n\n\n39:07 – Word Docs!!! \n\n\n\n47:41 – One Step Forward \n\n\n\n51:58 – Honeybadger Update \n\n\n\n53:56 – Back To Threat Intel; How BHIS Uses It \n\n\n\n56:03 – Questions \n\n\n\n This webcast was originally recorded live on January 23, 2020 with John Strand. \n\n\n\n\n\n\n\nWild West Hackin’ Fest – Most Hands-On Infosec Con!","thumbnail_url":"https://img.transistorcdn.com/WPYM9pq_SRUcywHv9tdgpsGLyLx04W2rDmzktvAcD4Y/rs:fill:0:0:1/w:400/h:400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xZTA1/ZWZhNDcxZGM4ZTFj/ZGJhMTMwNmYzMmJj/ZjBkNi5wbmc.webp","thumbnail_width":300,"thumbnail_height":300}