Rapid7, Inc.
Containing compromised credentials using deception systems
Last updated:
Abstract:
Disclosed herein are methods, systems, and processes for containing compromised credentials using deception systems. A request to authenticate a credential is received at a honeypot and a determination is made that the request includes context information that correlates the credential with network components that are part of the network. A protected host in the network associated with the credential is identified and the credential is authenticated by validating the credential with the protected host. A determination is made that the credential is compromised and the credential is deactivated.
Status:
Grant
Type:
Utility
Filling date:
28 Mar 2019
Issue date:
12 Apr 2022