Deception Toolkit
- Project
- 17005 SCRATCh
- Description
- Can be installed without modification of proxied host
- Fine-grained control over deception strategies
- Easy deployment and configuration with containers and dashboard
- Contact
- Daniel Reti, DFKI
- Daniel.reti@dfki.de
- Technical features
Input(s):
- HTTP or SSH Service to Proxy
Main feature(s):
- Inject lures into application traffic
- Conceal critical information
Output(s):
- Alerts in dashboard
- High detection rate
- Integration constraints
- Need to set the firewall to only accept messages from the proxy
- Need to direct incoming requests through the proxy, e.g., by pointing the DNS domain to the proxies IP
- The SSH proxy needs the SSH keys or credentials for the SSH service that is being proxied
- Targeted customer(s)
SMEs with HTTP or SSH service to protect.
- Conditions for reuse
None
- Confidentiality
- Public
- Publication date
- 18-03-2022
- Involved partners
- DFKI (DEU)