Professional Documents
Culture Documents
Canarytokens - Danger For Attackers
Canarytokens - Danger For Attackers
Home / Attack Strategies / Con�gure / Information Gathering Tools / Canarytokens -- Danger For Attackers
FOLLOW BY EMAIL
Email address...
Attackers SUBMIT
Attack Strategies, Con�gure, Information Gathering Tools
Canarytokens are one type of customisable unique links that someone click or access this
links we can get many information of target like the IP, location, browser, target is using tor or CATEGORIES
not and many more information.
Attack Strategies Con�gure
The main use of canarytokens is track malicious activity on our own network, application, web
server and start an alert. Custom Tools For Kali Linux
website from cyber criminals, here canarytokens can help. Obviously this can't save us, but it
Password Attacks
can alert us on suspicious activities on our system.
POPULAR POSTS
Modlishka -- Advanced
Phishing | Bypass Two Factor
Authentication
Previously we have covered about Honeypots. Honeypots are used to trap the attackers.
Canarytokens are also one type of honeypots, with the help of canarytokens we can set
trigger on our system networks website, application. Whenever someone trying to do
anything wrong canarytokens can send send noti�cations to us.
Let's start some practical of canarytokens. First we see how we can �nd someones
information with canarytokens. To start this we open this link on browser
https://canarytokens.org/generate
RECENT POSTS
CCM
MSSeeeeKK ---- DDeetteecctt CCM
MSS aanndd EExxppllooiittaattiioonn SSuuiitt
CMS stands for Content Management System. Using
CMS people can create...
Aug 06 2019 | Read more
Home Con�gure Information Gathering Attack Strategies Password Attacks Metasploit Nmap Custom Tools
Here we can see we can generate canarytokens for different type of works like :
Windows Folder token (Be noti�ed when a windows folder is browsed in Windows explorer)
Custom exe / binary token (Get noti�ed when an EXE or DDL is executed)
Cloned website token (Get an alert when your website is cloned)
SQL Server token (Get noti�ed when MS SQL server databases is accessed)
QR Code token (Generate QR Code for physical token)
SVN token (Alert when someone checks out an SVN repository)
AWS keys token (Alert when AWS key is used)
Fast Redirect token (Alert when url is visited. User is redirected)
Slow Redirect token (Alert when url is visited. User is redirected, grab more information)
Here we choose web-bug or url token, then we need to type our e-mail address for alert
noti�cation. Then we need to put a note that when the alert comes we can identify from
which tokens alert comes. This note is totally depends on us that what note we typed here.
After clicking on create canarytokens we can see our canarytokens for web-bug is ready. See
in the following screenshot:
Now we can copy and send this link to victim. Here is some idea about how to send this link.
Home Con�gure Information Gathering Attack Strategies Password Attacks Metasploit Nmap Custom Tools
We also can set this link on any web page image with <img src=""> , we need to
make sure that the image must be attractive so victim will click on it.
We can use social engineering to track someone by sending this link.
When our target clicks on this link we will get various information. I have clicked on my own
link and for checking the information we are going "Manage this token" as shown in the
following screenshot:
Check the next screenshot that we have successfully triggered our token, and we can now
check the history.
So, we have successfully created and triggered our url canarytoken. Even we choose Microsoft
word document , then we got Microsoft word �le to download. After Downloading we can
give the �le a juicy name and send this word �le by email or any other way or we can save it in
Home Con�gure Information Gathering Attack Strategies Password Attacks Metasploit Nmap Custom Tools
Same we can choose windows folder token, here we got a zip �le and we need to extract the
folder and rename with a spicy name, whenever someone opens our this folder in windows
explorer canary token will triggered and we got all the information. So this is the way to use
Canarytokens.
If it happens with us means someone send us canarytokens link then how save our identity
and privacy.
Here clearly seen that it is a canarytoken link but when someone use url shortner to short the
link then before clicking the link we can expand the link with the help of some online services
like :
http://checkshorturl.com/
https://www.expandurl.net/
www.getlinkinfo.com/
And there is a tool on Github that detects canarytoken link on Microsoft of�ce document. We
can clone this tool by applying following command:
Then we go to the cloned folder and we also need to copy the Microsoft Word document into
the same directory.
And give the �le execute permission using the following command:
chmod +x canarytokendetector�sh
�/canarytokendetector�sh
And then we type the name of the Microsoft Word �le and hit Enter.
Home Con�gure Information Gathering Attack Strategies Password Attacks Metasploit Nmap Custom Tools
We can clearly see in the above screenshot the our this �le is contains Canarytoken link.
This is how we can be safe from this type of links. Share this tutorial on social media to save
the privacy of your friends. And tell us in comment how you are gonna use this Canarytokens
?
CMSeeK -- Detect CMS and Ct-Exposer -- Find Hidden Userrecon -- Find Social
Exploitation Suit and Internal Sub-Domains Media Accounts
PREVIOUS NEXT
Set Up Honeypot in Kali Linux | Trap For Hackers Facebook Account Hacking -- The Truth in Details
1 Comment:
Awasome
Reply
Shellphish -- Simple Attack Strategies Con�gure Kali Linux For Con�guring In Windows
Phishing Toolkit | Phishing
Custom Tools For Kali Linux Kali Linux For Windows Kali Linux is the upgraded
Page Creator
version of BackTrack Linux. It was �rst raised in
Information Gathering Tools
2012 with a total new architecture....