Skip to content

Using Breadcrumbs

Breadcrumbs are an effective way to lure attackers toward your honeypots, diverting them from your systems and data.

Breadcrumbs act as decoys and can be configured as profiles or entries across various services on your network. They are designed to mimic valuable information that attackers often seek like credentials, network connections, or network shares. However, this information is fake and has been placed strategically in areas that an attacker typically explores. When the attacker stumbles onto the breadcrumb, they believe they've found a useful connection when in fact they are being lead directly to your Trapster. This process accelerates the chances of them triggering your Trapster alarm, reducing the time an they spend on your actual network and alerting you to their presence.

Trapster simplifies the creation and management of breadcrumbs directly through your dashboard, handling both the generation and storage of breadcrumb data. Each breadcrumb is given a uniquely generated username and password pair, designed to appear as legitimate credentials that attackers are likely to target. These credentials are saved in your dashboard until you choose to delete them, and will never have access to any of your legitamite credential information. Whenever a hacker attempts to use any of these fake credentials in your Trapster, it is immedietly detected and allows Trapster to send a unique breadcrumb alert to notify you. Because Trapster requires a note detailing each Breadcrumb's location, we can also inform you of the exact machine and service the attacker had access to.