

The tokens can also be used to set up email honeypots to notify the owners when the email has been hacked. Using canary tokens, we can be able to secure various assets from unauthorized access. Canary tokens, as described above, are easier to run and require fewer resources compared to honeypots. We were able to run canary tokens app on our server. Within the email notification sent to you, we can be able to view the IP address, Geo-location (only if the Google Maps API is configured), and the browser User Agent string. We are provided with a link that will trigger an alert whenever someone accesses it as shown in the image below. To generate a canarytoken for use we just specify the kind of token we want to generate and create the token. If we want to receive the geolocation from where the canarytoken was initialized, we can add Google Maps API Key under CANARY_GOOGLE_API_KEY.ĪLSO READ: Using WPA2 WiFi Honeypot for Ethical Hacks On the frontend.env, we just need to add the domain name under CANARY_DOMAINS. Next, we add the email to be used under CANARY_ALERT_EMAIL, and finally, we add our domain under CANARY_PUBLIC_DOMAIN. We will define the address under CANARY_PUBLIC_IP as shown in the image below. On the switchboard.env file, the first thing we need to specify is our IP address. To create the files we copy their contents from samples we downloaded. The files will contain the configurations required for the canarytokens server to run. There are two configuration files we need to create ( frontend.env and switchboard.env).
Canary mail alert download#
git clone Īfter the download is complete we navigate to the folder having our files. To run an instance of canarytokens on our server, we first download the docker version from the official GitHub repository.
Canary mail alert install#
Install and configure canarytokens server echo ‘deb buster stable’ | sudo tee /etc/apt//docker.listĪnd finally, run the command to download and install docker on our machine.ĪLSO READ: #2-ELK Stack: Enable https with ssl/tls & secure elasticsearch cluster Next step we configure the docker APT repository.

curl -fsSL | gpg -dearmor | sudo tee /usr/share/keyrings/docker-archive-keyring.gpg > /dev/null To install docker on a debian-based server, we will first add the Docker PGP key. Since the server runs on docker, our first step is to install docker on our machine. To run our own server instance, there are several components we need to make sure they are installed. Using canary tokens for intrusion detection Install Docker In this guide, we will install and run an instance of canary tokens server that can be used to protect assets for an organization. Excel documents, Custom EXE, Windows Directories e.t.c. Some of the assets that can be protected using canary tokens include: Whenever an asset protected by a canary token is accessed, an email notification is sent back to the email provided. Canary tokens can be used on production systems and unlike setting up honeypots, they do not require much resources to set up. Canary tokens are just like web bugs (The transparent images added on an email to enable a user to know when the email is opened for example, when running a phishing campaign and we need to know who opened the email and who clicked on the link).
Canary mail alert free#
Canary tokens are a free and easy way of protecting assets such as emails, websites, and documents from unauthorized access.
