Can-D is a proof-of-concept cyber deception tool. Using wordlists of names and login credentials, DIAC outputs a randomly generated list of "sensitive information" (actually junk credentials) in CSV format. This tool is intended to be imported into a SQL database with high logging as a piece of "valuable information" that an attacker would steal. Being randomly generated and useless credentials, this tool is intended to introduce uncertainty to exfiltrated data.
Use this in a legitimate database hosting valuable data or in a dedicated "sensor" server to bait attackers into exfiltrating completely useless data!
Features:
- Demographic full names - make the junk full names reflect your company's demographics by providing country codes and percentages!
- Username convention configuration - make the junk usernames resemble real ones from your company!
- Password complexity filtering - make the junk passwords comply with your password policy!
- "Telling credential" - an exceptionally complex and unique password is inserted somewhere into the output. Use this cred to determine if your junk data is being used in a spraying attack!
- Inject predefined credentials - include credentials that you WANT the attacker to try. These could be real users or honey users designed to trip some other defense in your network!
- Automatic password hashing - make the credentials seem more realistic by storing passwords as a hash digest. Options include MD5, SHA256, SHA512, and more.
- CLI and config file control - adjust your credential generation and output to best fit your defenses/infrastructure!
- Helper scripts - easily install Can-D and import your table into MySQL!
To install via script:
curl https://raw.githubusercontent.com/ouro-borous/Can-D/main/helper-scripts/install-can-d.sh | bash
To install manually:
git clone https://github.com/ouro-borous/Can-D.git
cd ./Can-D
pip install -r requirements.txt
It is recommended to set up a virtual environment before doing so.
git clone https://github.com/ouro-borous/Can-D.git
cd ./Can-D/
python3 -m venv venv
source venv/bin/activate
pip install -r requirements.txt
If you decide to use a virtual environment, remember to activate it before using Can-D again.
source venv/bin/activate
- names-dataset
- pyyaml
- argparse
- datetime
- urllib3
For a basic credential CSV file:
python3 ./can-d.py
For help with options, you can try:
python3 ./can-d.py -h
For a more advanced, realistic set of names and credentials (with hashed passwords):
python3 ./can-d.py -v -nE -pO -pF sha256