← All talks

Catch Hackers: Trace IP Addresses & Recover Data #shorts

BSides Frankfurt0:47959 viewsPublished 2026-03Watch on YouTube ↗
About this talk
Compromised system? Use a decoy document like 'Credit Card Information' to lure attackers. They grab it, open it, and you get a callback. Accurate tracking made simple. #Cybersecurity #Honeypot #IncidentResponse #ThreatHunting
Show transcript [en]

have IP address, date, timestamp, source port, you can go to any ISP in the world and you can get a with a warrant if they support warrants and they can tell you exactly where that IP address is at that time and we were able to get the girl back. So I used it in that case that was a long long long time ago. But you can also use this in your own organization where if you believe a system to be compromised, you can put a word document with a beacon in it with a name like credit card information, financial routing information, and the attacker will grab that document, pull it, open it up, and then you'll get a call back

from that attacker. Now, how accurate is