The use of deception in network and system compromise is a way to get an early alert for when your defenses fail.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/7780c504-4fae-4d61-8aaa-425337988968/Untitled.png

Boom. That’s it. Once the file is opened, it will send an automated email to the account you entered in step 3. If you want to tweak the document and add fake usernames and pass, have at it.

https://s3-us-west-2.amazonaws.com/secure.notion-static.com/69d92429-1f6c-4dd8-a4ab-8bd0e08c7824/Untitled.png

Additional types of Canarytokens include tokens for alerts…