

- #Alert canary website monitor pdf#
- #Alert canary website monitor code#
- #Alert canary website monitor windows#
When someone clones the website, they’ll include the JavaScript. If not, it loads the canary token and generates a new alert.
#Alert canary website monitor code#
The generated source code is very simple to understand: You can see our example to the right, using our example website. By clicking the “Create my Canarytoken” button, this snippet of code is presented. This is usually the first step in a well-executed phishing campaign. The canary token server can also send a notification if a Web page is copied (and hosted on another top-level domain). For that, we need to access the platform and pick the option “Cloned Website.” Trigger an alert when a website is clonedĬanary tokens can also be used to detect when a website is cloned by an adversary. This configuration allows the generation of a notification any time someone browses the directory in Explorer and can prevent data breaches or unauthorized accesses. IconResource=%USERNAME%.%USERDOMAIN%.dll Since this icon can reside on a remote server (via a UNC path), using DNS we can effectively make use of a token as our icon file. Dropping a desktop.ini file in a folder allows Explorer to set a custom icon for a file.
#Alert canary website monitor windows#
Windows provides an even better way to get notified, in the form of the venerable old desktop.ini configuration file. To carry out this task, we need to create a folder named “protected” in the C: drive. Unzip the file on the CEO’s laptop on a folder on their desktop in order to detect suspicious access attempts.Unzip the file on a temptingly-named Windows network share.This kind of token can be used in some cases, such as: Get an alert when a Windows folder is browsed in Windows Explorer

Note that it is also possible to export all the data in a JSON or CSV file format. When the link “More info on this token here” is clicked, the user can access a page where more information is presented. Note that this information was input during the creation of the canary token.īy clicking on “Manage this Canarytoken here,” the operator can disable the canary token. The token reminder is also described in the email in order to identify its origin. When someone accesses and opens this file (e.g., an adversary), an alert is triggered. So we can drop the file on a Windows network share or leave the file on a Web server in an inaccessible directory to detect possible breaches.Īs a next step, we need to create a new canary token and drop the generated file in a protected directory in a Microsoft Windows operating system: c:unautorized_directorypasswords.pdf.
#Alert canary website monitor pdf#
The Canarytokens platform generates both a Word and a PDF document. This can be achieved by placing a token in the document met-data, giving us a reliable ping when the document is opened. Get an alert when a PDF document is accessed
