Control attackers’ lateral movement
- Breadcrumbs on workstations and servers target attackers who are gathering information.
- Network breadcrumbs target attackers sniffing traffic and using Responder.py (Pass-the-Hash attacks).
- Decoys gather forensic information such as malicious executables or C&C server addresses (decoys are real servers, based on your environment).