У нас вы можете посмотреть бесплатно MCP Threat Trap Deception Engineering for Zero Trust AI Access или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
This session is for defenders, detection engineers, and curious red teamers exploring how Zero Trust meets deception engineering in the age of AI orchestration. We’ll break down how we built “MCP Threat Trap,” a honeypot that: - Simulates sensitive internal tools (like Okta admin password resets) over the MCP protocol, with realistic delays, secure error handling, and SSE streams that mimic enterprise APIs. - Silently triggers advanced Canarytokens, capturing rich metadata (user agent, IP, and sensitive account attempts) without tipping off intruders. - Runs entirely on Cloudflare’s global edge via Workers, with no EC2, patching, or infrastructure to manage-making it stealthy and instantly scalable. - Turns random scans into actionable intelligence, feeding Zero Trust policies and arming your incident team with context-rich alerts. Along the way, we’ll share: -Real unsolicited hits from the wild, from abuse-flagged cloud scanners to curious humans after we posted the project. - How we validated this with OWASP AI Security scenarios, catching AI-agent driven reconnaissance. - Ideas for evolving it into adaptive deception surfaces that dynamically change as attackers interact. Key Takeaways - Learn how to build a zero-infrastructure deception honeypot using serverless edge + MCP, tailor-made to catch AI-driven or automated recon. - See how Canarytokens detect unauthorized probes with near-zero false positives. - Walk away with a repeatable blueprint to deploy your own globally distributed honeypot - plus key mistakes to avoid.