This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
certificate_monitoring [2022/10/02 12:23] kaduuwikiadmin |
certificate_monitoring [2023/05/22 20:40] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
===== What is certificate monitoring about? ===== | ===== What is certificate monitoring about? ===== | ||
- | Let's Encrypt | + | Many certificate services |
+ | |||
+ | ===== What is a certificate transperency log? ===== | ||
+ | |||
+ | Certificate Transparency (CT) logs are public, append-only logs that are used to record the issuance of SSL/TLS certificates. These logs are designed to improve the transparency and accountability of the certificate issuance process by making it possible for anyone to view the information that is recorded in the logs. | ||
+ | |||
+ | * CT logs are used to record the issuance of SSL/TLS certificates, | ||
+ | * CT logs are publicly accessible, and anyone can view the information that is recorded in them. This allows anyone to verify that a certificate was issued by a trusted CA and that it has not been tampered with. | ||
+ | * CT logs provide a way to detect and revoke misissued certificates, | ||
+ | * CT logs can be used to monitor the issuance of certificates in real-time, and this allows organizations to detect and respond to potential security threats more quickly. | ||
+ | * CT logs are an important part of the certificate issuance process, and they are required by modern browsers such as Google Chrome, Mozilla Firefox, and Microsoft Edge, as well as other industry standards. | ||
+ | * There are multiple CT logs operated by different organizations, | ||
+ | |||
+ | ===== What is the benefit of this monitoring? ===== | ||
+ | |||
+ | You can prevent social engineering and phishing attacks by detecting malicious websites as they are being created. Many hackers secure their phishing websites with SSL, for example, in order to make the user believe that the site is trustworthy and secure. As soon as we recognize the name of the organization to be monitored in the certificate, | ||
+ | |||
+ | |||
+ | ===== What should you do if you receive an alert? ===== | ||
+ | |||
+ | First of all, you need to evaluate whether the website is legitimate or not. One should resolve the IP address of the server ("ping ebanking365.webhosting.ru" | ||
+ | |||
+ | **Report the website to the following organisations: | ||
+ | phishing-report@us-cert.gov | ||
+ | report@phishing.gov.uk | ||
+ | reportphishing@apwg.org | ||
+ | reportphishing@antiphishing.org | ||
+ | phish@phishtank.com | ||
+ | https:// | ||
+ | |||
+ | **Copy the malicious URL of the phishing site and use it to report to the following anti phishing services** | ||
+ | Google: https:// | ||
+ | Symantec: https:// | ||
+ | Eset: http:// | ||
+ | PhishTank: https:// | ||
+ | Microsoft: https:// | ||
+ | Netcraft: http:// | ||
+ | |||
+ | |||
+ | **Use the web based tools like https:// | ||
+ | |||
+ | For malicious domains, contact the hosting service and the domain registry to notify them of the scam, requesting that they take action to suspend the account or take it offline. Often this email is sent to abuse@. Follow up with a phone call to both the hosting service and the domain registry with the request | ||
+ | |||
+ | |||
+ | ===== How does certificate monitoring differ from domain monitoring? ===== | ||
+ | |||
+ | We take the above example: If the organization to be monitored has https:// | ||
+ | |||
+ | |||
+ | ===== What CA's do we monitor? ===== | ||
+ | |||
+ | We monitor all common CA's. Here are some examples: | ||
+ | |||
+ | * cPanel, Inc. Certification Authority, | ||
+ | * LetsEncrypt, | ||
+ | * Cloudflare, Inc, | ||
+ | * Sectigo Limited, | ||
+ | * GlobalSign nv-sa, | ||
+ | * DigiCert Inc, | ||
+ | * Google Trust Services LLC, | ||
+ | * ZeroSSL RSA Domain Secure Site CA, | ||
+ | * Amazon, | ||
+ | * Unizeto Technologies S.A, | ||
+ | * Go Daddy Secure Certificate Authority, | ||
+ | * Microsoft Azure TLS Issuing CA 02, | ||
+ | * TWCA Secure SSL Certification Authority, | ||
+ | * Sectigo RSA Domain Validation Secure Server CA | ||
====== How does it work? ====== | ====== How does it work? ====== | ||
- | Setting up certificate monitoring is very simple. Navigate to the expert menu and click on certificates. You can enter a search term like " | + | Setting up certificate monitoring is very simple. Navigate to the expert menu and click on certificates. You can enter a search term like " |
- | {{:: | + | {{:: |