Skip to content

Commit

Permalink
Fake file system Documentations (#58)
Browse files Browse the repository at this point in the history
* Create windows-fake-files-token.md

Added Windows Fake File System Folder

* Update windows-fake-files-token.md

Screen shot

* Update windows-fake-files-token.md

Image Update

* Update windows-fake-files-token.md

Updated screen shots and removal instructions

* Update windows-fake-files-token.md

typo

* fix typos

---------

Co-authored-by: Sara Tavares <[email protected]>
  • Loading branch information
thinkst-cs and stavares843 authored Dec 13, 2024
1 parent 60302c2 commit 31f6a0e
Showing 1 changed file with 42 additions and 0 deletions.
42 changes: 42 additions & 0 deletions docs/guide/windows-fake-files-token.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,42 @@
# Windows Fake File System

## What is a Fake File System

Have you ever wanted to create a fake list of sensitive files and receive an alert if one of them is opened or copied?

This simple Canarytoken allows you to set up a fake directory, with context-specific file names and extensions.

This Canarytoken uses the built-in Windows Projected File System, to create and monitor a path.

This is done with a PowerShell script behind the scenes.


## Creating a Windows Fake File System Canarytoken

Head on over to [canarytokens.org](https://canarytokens.org/generate) and select `Windows Fake File System`:

![image](https://github.com/user-attachments/assets/e5e85422-aff6-4b19-aec8-55034c5f5a9d)


Enter the Path for your folder, email address, or webhook address along with a reminder that will be easy to understand.

Then click Create:

<img width="707" alt="image" src="https://github.com/user-attachments/assets/8f595680-33e6-4957-be02-879193b6905c">


Download the .ps1 file to a Windows system. You need to execute this as an Administrator. This installs the Windows Projected File System and creates the scheduled task.



## How to use this Canarytoken

Once this token is installed, it will create and start a Scheduled Task to spawn the Windows Fake File System Provider.

You can browse to this folder and list files. This will not trigger an alert.

If an attacker opens or copies a file, then you will get an alert that lets you know the process and file that was accessed.

If you would like to remove the task, simply run the PowerShell script again with `-Remove`. This will stop the process managing the folder and remove any artifacts created.


0 comments on commit 31f6a0e

Please sign in to comment.