MITRE ATT&CK technique T1145
Tactic: Credential Access
Platform: Windows, Linux, Mac
- Create fake private keys (i.e. honeyfiles) and monitor access to them using go-audit, auditd or a File Integrity Monitoring (FIM)
- Create files or documents containing deceptive content and breadcrumbs (e.g. keys for connecting to SSH honeypots) to lure the attacker toward your honeypots.
- Fake entries in ~/.ssh/known_hosts, e.g.:
192.168.1.66 ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAEXAMPLE