Loading...
Loading...
Guides cybersecurity deception operations using MITRE D3FEND—honeynets, decoy objects, decoy personas, and decoy credentials. Covers honeypot deployment, decoy file planting, credential baiting, and deception environment design. Use when deploying honeypots, planting decoy data, baiting credentials, or designing deception programs—not for detection (d3fend-detect), hardening (d3fend-harden), or isolation (d3fend-isolate).
npx skill4agent add daemon-blockint-tech/agentic-enteprises-skill d3fend-deceived3fend-detectd3fend-hardend3fend-isolatecybersecurityai-redteamoffensive-security-analyst| Type | Deployment | Use Case |
|---|---|---|
| Standalone | Isolated network segment | Research, early warning |
| Integrated | Blended with production | Insider threat, lateral movement |
| Connected | Linked to real systems | APT detection, TTP collection |
references/honeynets.mdreferences/decoy_objects.mdreferences/deception_program.mdreferences/honeynets.mdreferences/decoy_objects.mdreferences/deception_program.md