Skip to content

Commit 848ee93

Browse files
Updated doc canarytoken revamp (#53)
* Update wording and screenshots * update wording * update screenshot for DNS token * remove nvmrc * Fix typos and wording * fix typo * replace Canarytoken's
1 parent 205c3a2 commit 848ee93

33 files changed

+129
-128
lines changed

.gitignore

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,4 @@
11
.DS_Store
22
node_modules
33
docs/.vuepress/dist/
4+
.nvmrc
Loading
Loading
Loading
79.1 KB
Loading
-82.4 KB
Loading
57.3 KB
Loading
164 KB
Loading
-71.8 KB
Loading
Loading
Loading

docs/guide/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -6,12 +6,12 @@ prev: false
66

77
## What are Canarytokens
88

9-
You'll be familiar with web bugs, the transparent images which track when someone opens an email. They work by embedding a unique URL in a page's image tag, and monitoring incoming GET requests.
9+
Canarytokens are like motion sensors for your networks, computers and clouds. You can put them in folders, on network devices and on your phones.
1010

11-
Imagine doing that, but for file reads, database queries, process executions or patterns in log files. Canarytokens does all this and more, letting you implant traps in your production systems rather than setting up separate honeypots.
11+
Place them where nobody should be poking around and get a clear alarm if they are accessed. They are designed to look juicy to attackers to increase the likelihood that they are opened (and they are completely free).
1212

1313
## Why should you use them
1414

15-
Network breaches happen. From mega-corps, to governments. From unsuspecting grandmas to well-known security pros. This is (kinda) excusable. What isn't excusable, is only finding out about it, months or years later.
15+
Our Canarytokens are easy to sprinkle all over and forget about, until you get the notification that matters. They are super lightweight and don’t require installing software or running more background processes that can slow down your PC.
1616

17-
Canarytokens are a free, quick, painless way to help defenders discover they've been breached (by having attackers announce themselves.)
17+
Canarytokens are a distilled version of our much-loved [Canary product](https://canary.tools/). They are dead simple, and they work.

docs/guide/adobe-pdf-token.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
# Adobe PDF Token
1+
# Adobe PDF Canarytoken
22

3-
## What is an Adobe PDF token
3+
## What is an Adobe PDF Canarytoken
44

5-
This Canarytoken is a PDF document that will notify you when it has been opened (by reasonably compliant PDF readers). The token works by forcing the PDF reader to do a DNS lookup on a unique address (so we can safely tie the resolution to the opening of the Document).
5+
This Canarytoken is a PDF document that will notify you when it has been opened (by reasonably compliant PDF readers). The Canarytoken works by forcing the PDF reader to do a DNS lookup on a unique address (so we can safely tie the resolution to the opening of the Document).
66

7-
>**Note**: DNS tokens are great to get a beacon out from a heavily filtered network, but lack the granularity of some other tokens. In this case, the best you can hope for is to be aware that the document was opened, and have a rough idea of the source.
7+
>**Note**: DNS Canarytokens are great to get a beacon out from a heavily filtered network, but lack the granularity of some other Canarytokens. In this case, the best you can hope for is to be aware that the document was opened, and have a rough idea of the source.

docs/guide/aws-keys-token.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
1-
# AWS API Keys Token
1+
# AWS API Keys Canarytoken
22

3-
## What is an AWS API Keys Token
3+
## What is an AWS API Keys Canarytoken
44

5-
This token provides you with a set of AWS API keys. Leave them in private code repositories, leave them on a developers machine. An attacker who stumbles on them will believe they are the keys to your cloud infrastructure. If they are used via the AWS API at any point, you will be alerted.
5+
This Canarytoken provides you with a set of AWS API keys. Leave them in private code repositories, leave them on a developers machine. An attacker who stumbles on them will believe they are the keys to your cloud infrastructure. If they are used via the AWS API at any point, you will be alerted.
66

7-
## Creating the token
7+
## Creating the Canarytoken
88

9-
Create a token by choosing "AWS API Key" from the drop down list.
9+
Create a Canarytoken by choosing "AWS Keys" from the Canarytokens list.
1010

11-
Leave a reasonable comment to remind yourself where you will deploy the token.
11+
Leave a reasonable comment to remind yourself where you will deploy the Canarytoken.
1212

1313
The AWS credentials that are displayed can be copied into a file named credentials or keys (as per AWS custom). The two provided keys must be kept together for an attacker to use the AWS API.
1414

docs/guide/cloned-web-token.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
1-
# Cloned Website Token
1+
# Cloned Website Canarytoken
22

3-
## What is a Cloned Website Token
3+
## What is a Cloned Website Canarytoken
44

55
This Canarytoken is placed within the JavaScript of your websites and notifies you if someone clones your site and hosts it on another domain. (This is often used for targeted Phishing attacks.)
66

7-
## Creating a Cloned Website token
7+
## Creating a Cloned Website Canarytoken
88

9-
Create a token by choosing "Cloned Website" from the drop down list.
9+
Create a Canarytoken by choosing "JS Cloned Website" from the Canarytokens list.
1010

11-
Leave a reasonable comment to remind yourself where you will deploy the token. Then, supply the domain that you want to protect (this is the domain where the site is deployed that you will insert your tokenized javascript into).
11+
Leave a reasonable comment to remind yourself where you will deploy the Canarytoken. Then, supply the domain that you want to protect (this is the domain where the site is deployed that you will insert your tokenized javascript into).
1212

1313
You'll get javascript similar to:
1414

docs/guide/css-cloned-site-token.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
1-
# CSS Cloned Website Token
1+
# CSS Cloned Website Canarytoken
22

3-
## What is a CSS Cloned Website Token
3+
## What is a CSS Cloned Website Canarytoken
44

55
This Canarytoken is placed within either the CSS of your site, or inside a 3rd party site, where you may not be able to add JavaScript and notifies you if someone clones your site and hosts it on another domain. This can alert on targeted or Adversary-in-the-Middle (AitM) phishing attacks.
66

7-
## Creating a CSS Cloned Website Token
7+
## Creating a CSS Cloned Website Canarytoken
88

9-
Create a token by choosing "CSS Cloned Website" from the dropdown list.
9+
Create a Canarytoken by choosing "CSS Cloned Website" from the Canarytokens list.
1010

11-
Leave a reasonable comment to remind yourself where you will deploy the token. Then, supply the domain that you want to protect (this is the domain where the site is deployed that you will insert your tokenized css into).
11+
Leave a reasonable comment to remind yourself where you will deploy the Canarytoken. Then, supply the domain that you want to protect (this is the domain where the site is deployed that you will insert your tokenized css into).
1212

1313
You'll get a CSS Snippet similar to:
1414

@@ -18,9 +18,9 @@ body {
1818
}
1919
```
2020

21-
Upon a client making the request, our CloudFront infrastructure will validate the HTTP Referer header to ensure it is expected. You get an alert if the domain doesn't match the expected domain used during the creation of the token.
21+
Upon a client making the request, our CloudFront infrastructure will validate the HTTP Referer header to ensure it is expected. You get an alert if the domain doesn't match the expected domain used during the creation of the Canarytoken.
2222

2323
Ideas for use:
2424

25-
- Only the `url()` portion is required, you can change the selector and add `opacity: 0` or `display: hidden` if you want to style an invisible element.
25+
- Only the `url()` portion is required, you can change the selector and add `opacity: 0` or `display: hidden` if you want to style an invisible element.
2626
- Use this CSS to style 3rd party authentication pages, such as a [LogTo](https://logto.io) page, or an [AWS Cognito login](https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-user-pools-app-ui-customization.html)

docs/guide/custom-exe-token.md

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
1-
# Custom EXE Token
1+
# Custom EXE Canarytoken
22

3-
## What is a Custom EXE Token
3+
## What is a Custom EXE Canarytoken
44

5-
This token works by signing an EXE or a DLL with a certificate containing a Canarytoken. When the EXE is run, or the DLL is loaded, an alert is fired.
5+
This Canarytoken works by signing an EXE or a DLL with a certificate containing a Canarytoken. When the EXE is run, or the DLL is loaded, an alert is fired.
66

7-
## Creating the token
7+
## Creating the Canarytoken
88

9-
Create a token by choosing "Custom exe" from the drop down list.
9+
Create a Canarytoken by choosing "Custom exe / binary" from the Canarytokens list.
1010

11-
Leave a reasonable comment to remind yourself where you will deploy the token. Then, select the EXE or the DLL to be signed.
11+
Leave a reasonable comment to remind yourself where you will deploy the Canarytoken. Then, select the EXE or the DLL to be signed.
1212

13-
The file can now be downloaded. Remember, this token is triggered whenever the binary file is executed. For EXEs, this means direct execution and for DLLs, it means they were loaded.
13+
The file can now be downloaded. Remember, this Canarytoken is triggered whenever the binary file is executed. For EXEs, this means direct execution and for DLLs, it means they were loaded.
1414

1515
## What to tokenize
1616

17-
When choosing which files to token, decide on a few binaries commonly used by attackers, and token these.
17+
When choosing which files to Canarytoken, decide on a few binaries commonly used by attackers, and Canarytoken these.

docs/guide/dns-token.md

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,33 +1,33 @@
1-
# DNS Token
1+
# DNS Canarytoken
22

3-
## What is a DNS token
3+
## What is a DNS Canarytoken
44

55
When you create a DNS based Canarytoken, the system gives you a unique Internet resolvable domain name.
66

77
Anyone attempting to resolve this domain name, will now trigger an alert.
88

9-
Why does this matter? Once you are able to get an alert for a web-based token, or a DNS based token, you have the building blocks for squillions of possible tripwires.
9+
Why does this matter? Once you are able to get an alert for a web-based Canarytoken, or a DNS based Canarytoken, you have the building blocks for squillions of possible tripwires.
1010

11-
## Creating a DNS token
11+
## Creating a DNS Canarytoken
1212

13-
Head on over to [canarytokens.org](https://canarytokens.org/generate) and select `DNS token`:
13+
Head on over to [canarytokens.org](https://canarytokens.org/generate) and select `DNS`:
1414

15-
![Creating a DNS token](../.vuepress/images/dns_token_creating.png)
15+
![Creating a DNS Canarytoken](../.vuepress/images/dns_token_creating.png)
1616

1717
Enter your email address along with a reminder that will be easy to understand then click Create:
1818

19-
![Created an HTTP token](../.vuepress/images/dns_token_created.png)
19+
![Created an HTTP Canarytoken](../.vuepress/images/dns_token_created.png)
2020

2121
Copy the hostname and place it somewhere useful.
2222

23-
## Encoding additional information in your token
23+
## Encoding additional information in your Canarytoken
2424

25-
Your DNS token can carry a small amount of additional custom data when it’s triggered. This can be used for adding incident-specific data to your alert with custom DNS based tokens. Use the following encoding rules to place generic data into your DNS token:
25+
Your DNS Canarytoken can carry a small amount of additional custom data when it’s triggered. This can be used for adding incident-specific data to your alert with custom DNS based Canarytokens. Use the following encoding rules to place generic data into your DNS Canarytoken:
2626

2727
* Base32 encode your data, and remove any padding '=' characters
2828
* Insert periods (.) after every 63-bytes
2929
* Append the magic string '.G'+<2-random-digits>+'.' (e.g. '.G12.' or '.G83.')
30-
* Append your DNS token
30+
* Append your DNS Canarytoken
3131
This creates a new hostname of the form:
3232
```
3333
<base32-string>.<base32-string>.G<2-random-digits>.<dns-token>

docs/guide/fast-redirect-token.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,11 +1,11 @@
1-
# Fast Redirect Token
1+
# Fast Redirect Canarytoken
22

3-
## What is a Fast Redirect Token
3+
## What is a Fast Redirect Canarytoken
44

5-
This token is similar to the HTTP token but the token redirects to a custom address once triggered. The difference between the regular HTTP token and the Fast Redirect is that this token does not collect browser nor browser plugin information. For a redirect that does, see the Slow Redirect token in the next section.
5+
This Canarytoken is similar to the HTTP Canarytoken but the Canarytoken redirects to a custom address once triggered. The difference between the regular HTTP Canarytoken and the Fast Redirect is that this Canarytoken does not collect browser nor browser plugin information. For a redirect that does, see the Slow Redirect Canarytoken in the next section.
66

77
## Creating the token
88

9-
Create a token by choosing "Fast Redirect" from the drop down list.
9+
Create a Canarytoken by choosing "Fast Redirect" from the Canarytokens list.
1010

11-
Leave a reasonable comment to remind yourself where you will deploy the token. Add the redirect URL to which the token will redirect once fired. Then click "Create New Canarytoken" to create the token.
11+
Leave a reasonable comment to remind yourself where you will deploy the Canarytoken. Add the redirect URL to which the Canarytoken will redirect once fired. Then click "Create New Canarytoken" to create the Canarytoken.

docs/guide/getting-started.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -4,15 +4,15 @@
44

55
Go to [canarytokens.org](https://canarytokens.org/generate) and select your Canarytoken (supply an email to be notified at as well as a memo that reminds you which Canarytoken this is and where you put it).
66

7-
![Created an HTTP token](../.vuepress/images/http_token_creating.png)
7+
![Created an HTTP Canarytoken](../.vuepress/images/http_token_creating.png)
88

99
Place the generated Canarytoken somewhere special (read the [examples](./examples.md) for ideas on where).
1010

1111
If an attacker ever trips on the Canarytoken somehow, you'll get an email letting you know that it has happened.
1212

13-
## How do attackers trip over a token
13+
## How do attackers trip over a Canarytoken
1414

15-
Recall that a typical token is a unique URL and/or hostname. The URL component is pretty flexible. This means that if your token is:
15+
Recall that a typical Canarytoken is a unique URL and/or hostname. The URL component is pretty flexible. This means that if your Canarytoken is:
1616

1717
```bash
1818
http://45e51129ec7e.o3n.io/images/o63277vnjf6nfobn3cbey69fh/spacer.gif
@@ -27,25 +27,25 @@ http://45e51129ec7e.o3n.io/images/o63277vnjf6nfobn3cbey69fh/passwords.zip
2727
http://45e51129ec7e.o3n.io/images/o63277vnjf6nfobn3cbey69fh/anything-really
2828
```
2929

30-
would still activate your token. This gives us the simplest use-case for a token, an old fashioned web-bug.
30+
would still activate your Canarytoken. This gives us the simplest use-case for a Canarytoken, an old fashioned web-bug.
3131

32-
For example, you could send yourself an email with a link to the token plus some lure text:
32+
For example, you could send yourself an email with a link to the Canarytoken plus some lure text:
3333

3434
![Tokened mail](../.vuepress/images/tokened_mail.png)
3535

3636

3737
Simply keep it in your inbox unread since you know not to touch it. An attacker who has grabbed your mail-spool doesn't. So if your emails are stolen, then an attacker reading them should be attracted to the mail and visit the link – and while your week is about to get worse, at least you know.
3838

39-
If you like, you could even use the same token as an embedded image. This way it works like the classic 1x1 transparent GIF. Now an attacker reading your inbox could trip over it just because his mail client renders remote images. (In this way you can use free Canarytokens as a classic web/mail-bug, to receive a notification when an email you send has been read.)
39+
If you like, you could even use the same Canarytoken as an embedded image. This way it works like the classic 1x1 transparent GIF. Now an attacker reading your inbox could trip over it just because his mail client renders remote images. (In this way you can use free Canarytokens as a classic web/mail-bug, to receive a notification when an email you send has been read.)
4040

4141
## What memo should I use
4242

43-
Over time, if you are using Canarytokens correctly, you will deploy thousands of them all over the place. Make sure that your Reminder is descriptive, and will be self-describing. Nothing sucks more than having a token fire an alert that reads “test" - and not knowing where you placed it.
43+
Over time, if you are using Canarytokens correctly, you will deploy thousands of them all over the place. Make sure that your Reminder is descriptive, and will be self-describing. Nothing sucks more than having a Canarytoken fire an alert that reads “test" - and not knowing where you placed it.
4444

4545
## Production Usage
4646

4747
Canarytokens can be used as simple web-bugs, but they are incredibly flexible as we'll see.
4848

49-
You may have a fancy SIEM that lets you know when stuff happens, but you'll find that with a little creativity, there's a bunch of places that you could get wins from a token (that can be deployed in seconds) that you couldn't easily get to otherwise.
49+
You may have a fancy SIEM that lets you know when stuff happens, but you'll find that with a little creativity, there's a bunch of places that you could get wins from a Canarytoken (that can be deployed in seconds) that you couldn't easily get to otherwise.
5050

51-
Do you trust the admins/support at DropBox to leave your files alone? (or Office365? or HipChat?) Simply generate a token and drop it in your folder, or mention it in your HipChat channel. If some admin is browsing contents in their spare time (or is being coerced to do so by a 3rd party) they will trip over your URL and you'll be notified.
51+
Do you trust the admins/support at Dropbox to leave your files alone? (or Office365?) Simply generate a Canarytoken and drop it in your folder, or mention it in your HipChat channel. If some admin is browsing contents in their spare time (or is being coerced to do so by a 3rd party) they will trip over your URL and you'll be notified.

docs/guide/http-token.md

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -1,16 +1,16 @@
1-
# HTTP Token
1+
# HTTP Canarytoken
22

3-
## What is an HTTP token
3+
## What is an HTTP Canarytoken
44

55
When you create a HTTP based Canarytoken, the system gives you a URL.
66

77
Anyone attempting to browse to this URL will generate an alert.
88

9-
Why does this matter? Once you are able to get an alert for a web-based token, or a DNS based token, you have the building blocks for squillions of possible tripwires.
9+
Why does this matter? Once you are able to get an alert for a web-based Canarytoken, or a DNS based Canarytoken, you have the building blocks for squillions of possible tripwires.
1010

11-
## Creating an HTTP token
11+
## Creating an HTTP Canarytoken
1212

13-
Head on over to [canarytokens.org](https://canarytokens.org/generate) and select `Web bug /URL token`:
13+
Head on over to [canarytokens.org](https://canarytokens.org/generate) and select `Web bug`:
1414

1515
![Creating an HTTP token](../.vuepress/images/http_token_creating.png)
1616

docs/guide/kubeconfig-token.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -10,7 +10,7 @@ Using the Kubeconfig Canarytoken will simply return permission errors to an atta
1010

1111
## Creating a Kubeconfig token
1212

13-
Head on over to [canarytokens.org](https://canarytokens.org/generate) and select Kubeconfig token.
13+
Head on over to [canarytokens.org](https://canarytokens.org/generate) and select `Kubeconfig`.
1414

1515
Enter the email address or webhook where you would like to get alerts. Next, enter a reminder note that will be convenient for you to identify where you placed the Kubeconfig, when you get alerted.
1616

docs/guide/ms-excel-token.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,9 +1,9 @@
1-
# MS Excel Token
1+
# MS Excel Canarytoken
22

33
A special thanks to [Dominic White](https://twitter.com/singe) for making this happen.
44

5-
## What is a MS Excel Token
5+
## What is a MS Excel Canarytoken
66

7-
This is a Microsoft Excel document that will alert you whenever it is opened in Microsoft Office on Windows or MAC OS.
7+
This is a Microsoft Excel document that will alert you whenever it is opened in Microsoft Office on Windows or macOS.
88

99
This is useful for dropping into shares that shouldn't be accessed. Create a juicy filename (employee_salaries.xlsx, passwords.xlsx), leave it lying around on a network share, on a web server, in an email, and wait for the alert to tell you there's someone snooping around.

docs/guide/ms-word-token.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
1-
# MS Word Token
1+
# MS Word Canarytoken
22

3-
## What is a MS Word Token
3+
## What is a MS Word Canarytoken
44

5-
This is a Microsoft Word document that will alert you whenever it is opened in Microsoft Office on Windows or MAC OS.
5+
This is a Microsoft Word document that will alert you whenever it is opened in Microsoft Office on Windows or macOS.
66

77
This is useful for dropping into shares that shouldn't be accessed. Create a juicy filename (employee_salaries.docx, passwords.docx), leave it lying around on a network share, on a web server, in an email, and wait for the alert to tell you there's someone snooping around.

0 commit comments

Comments
 (0)