TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Black Hills InfoSec

Deceptive-Auditing: An Active Directory Honeypots Tool

BHIS · 2026-01-07 · Read original ↗

ATT&CK techniques detected

4 predictions
T1098Account Manipulation
76%
"these, the – spn parameter allows you to tie the user to an intriguing service prinicpal name. if you want to set up a privileged decoy user, there is a separate function called deploy - privilegeduserdeception. this function contains a – protection parameter which allows you to …"
T1548.002Bypass User Account Control
65%
"a sacl ( system access control list ) and dacl ( discretionary access control list ). both acls hold aces ( access control entry ) which determine permissions for object and auditing for the object. the dacl will determine who can access the object : user1 can read the object, us…"
T1558.003Kerberoasting
53%
"##perty once applying the audit rule with deploy - userdeception, any attempt to enumerate the user will trigger a 4662 event, pictured below. deploy - userdeception has some parameters to make this user more appealing. the userflag parameter has multiple options. - - doesnotrequ…"
T1558Steal or Forge Kerberos Tickets
39%
"##perty once applying the audit rule with deploy - userdeception, any attempt to enumerate the user will trigger a 4662 event, pictured below. deploy - userdeception has some parameters to make this user more appealing. the userflag parameter has multiple options. - - doesnotrequ…"

Summary

Deceptive-Auditing is a tool that deploys Active Directory honeypots and automatically enables auditing for those honeypots.

The post Deceptive-Auditing: An Active Directory Honeypots Tool appeared first on Black Hills Information Security, Inc..