This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
functionality_overview [2023/01/28 13:07] kaduuwikiadmin |
functionality_overview [2023/05/22 20:40] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== | + | ====== |
+ | |||
+ | In most areas, passive monitoring takes place. Thus, we do not actively scan for vulnerabilities or open ports. We use Kaduu to show what a hacker can learn about an organization. This includes leaked data, shadow IT, any sensitive information on hacker forums or the deep web, etc. Thus, most searches are past-oriented and show the consequence of security incidents. However, there are also functions that serve to prevent security incidents. For example, domain monitoring helps to detect phishing and malware attacks in preparation. | ||
+ | |||
+ | |||
+ | ---- | ||
===== DOMAIN MONITORING ===== | ===== DOMAIN MONITORING ===== | ||
Line 74: | Line 80: | ||
===== Hacker Forum Monitoring ===== | ===== Hacker Forum Monitoring ===== | ||
+ | |||
**What is the threat?** | **What is the threat?** | ||
Line 104: | Line 111: | ||
===== Telegram Monitoring ===== | ===== Telegram Monitoring ===== | ||
+ | |||
**Introduction** | **Introduction** | ||
Line 133: | Line 141: | ||
---- | ---- | ||
- | ====== Bucket and Cloud Storage Monitoring ====== | + | ===== Bucket and Cloud Storage Monitoring ===== |
**Introduction** | **Introduction** | ||
Line 161: | Line 170: | ||
---- | ---- | ||
- | ====== Github Monitoring ====== | + | ===== Github Monitoring ===== |
**Introduction** | **Introduction** | ||
Line 187: | Line 197: | ||
---- | ---- | ||
- | ====== Google Dork Monitoring ====== | + | ===== Google Dork Monitoring ===== |
**Introduction** | **Introduction** | ||
Line 216: | Line 227: | ||
===== Certificate Transparency Log Monitoring ===== | ===== Certificate Transparency Log Monitoring ===== | ||
+ | |||
Many certificate services automatically issues domain-validated (DV) certificates to websites by checking the URL's phishing status against the Google Safe Browsing API. Once issued, the issuer does not monitor the certificates or take any action afterward. Even if Google later flags the domain as malicious, the issuer will not revoke certificates. As a result, many phishing websites are secured with SSL certificates, | Many certificate services automatically issues domain-validated (DV) certificates to websites by checking the URL's phishing status against the Google Safe Browsing API. Once issued, the issuer does not monitor the certificates or take any action afterward. Even if Google later flags the domain as malicious, the issuer will not revoke certificates. As a result, many phishing websites are secured with SSL certificates, | ||
Line 257: | Line 269: | ||
* Sectigo RSA Domain Validation Secure Server CA | * Sectigo RSA Domain Validation Secure Server CA | ||
+ | **More information** | ||
+ | |||
+ | Please click [[certificate_monitoring|here]] for more information on the search syntax. | ||
---- | ---- | ||
===== Paste Site Monitoring ===== | ===== Paste Site Monitoring ===== | ||
+ | |||
Pastebin allows users to share text in the form of public posts called " | Pastebin allows users to share text in the form of public posts called " | ||
Line 293: | Line 309: | ||
+ | **More information** | ||
+ | |||
+ | Please click [[paste_git_monitoring|here]] for more information on the search syntax. | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Credit Card Monitoring ===== | ||
+ | |||
+ | **How are credit cards leacked to the darknet?** | ||
+ | |||
+ | Credit card information can be leaked to the darknet in a variety of ways, some of the common methods include: | ||
+ | |||
+ | * Data breaches: Hackers can gain unauthorized access to a company' | ||
+ | * Phishing scams: Hackers may use phishing scams to trick individuals into providing their credit card information. This information can then be sold on the darknet. | ||
+ | * Skimming: Hackers may use small devices called skimmers to steal credit card information from point-of-sale terminals. This information can then be sold on the darknet. | ||
+ | * Malware: Hackers may use malware to infect a computer or a mobile device and steal credit card information that is stored on it. This information can then be sold on the darknet. | ||
+ | * Insider threats: Employees or contractors with access to sensitive information may steal credit card information and sell it on the darknet. | ||
+ | * Physical card theft: credit card information can be stolen by physically stealing a credit card and using it or selling the information to a third party. | ||
+ | |||
+ | Once the credit card information is obtained, it can be sold on darknet marketplaces, | ||
+ | |||
+ | **How do we obtain credit card info?** | ||
+ | |||
+ | We try to collect mainly freely available credit card log dumps. Those dumps might not have the very latest card data which are ususally sold for a high price, but still can help owners identify if their card was affected by a leak in the past. Occiasionally we also buy dumps and make them available in elastic search DB from kaduu. | ||
+ | |||
+ | **How much does it cost if you had to buy stolen credit card data on the darknet?** | ||
+ | |||
+ | The cost of buying stolen credit card information on the darknet varies depending on a number of factors, including the type of card, the card's issuing country, and the amount of information that is included with the card. | ||
+ | |||
+ | Typically, a single credit card number, known as a " | ||
+ | |||
+ | On the other hand, a full package of information for a credit card, known as " | ||
+ | |||
+ | It is important to note that these prices are just an estimate and the cost may vary depending on the source and the quantity of data available. It's also worth noting that the prices are subject to change over time, and the prices may be different based on the location and the vendor. | ||
+ | |||
+ | **How can you find credit cards in Kaduu?** | ||
+ | |||
+ | The credit card data published comes from leaks that have already been published on the darknet. New cards are added continuously. The database is updated weekly or daily for major leaks. You find the Credit Card Search in the expert mode only. On this page you can search in a database of indexed credit card leaks. Credit cards are displayed in masked form and when you are searching the database. You may search using first 6 and last 4 digits and replace all middle digits with " | ||
+ | |||
+ | **More information** | ||
+ | |||
+ | Please click [[credit_card_search|here]] for more information on the search syntax. | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Ransomware Site Monitoring ===== | ||
+ | |||
+ | |||
+ | **Introduction** | ||
+ | |||
+ | Ransomware hackers have escalated their extortion strategies by stealing files from victims before encrypting their data. These stolen files are then used as further leverage to force victims to pay. Many ransomware hackers have created data leak sites to publicly shame their victims and publish the files they stole. Those are called "hall of shame" websites. Ransomware hall of shame websites are websites that publicly list the organizations and companies that have been victims of ransomware attacks. These websites typically include the names of the organizations, | ||
+ | |||
+ | The main goal of these websites is to raise awareness about the growing threat of ransomware and to encourage organizations to take steps to protect themselves from these types of attacks. These sites also serve as a warning to other organizations and individuals about the dangers of not applying proper cyber security measures in place. | ||
+ | |||
+ | It's important to note that the inclusion of a company or an organization in a Ransomware Hall of Shame website doesn' | ||
+ | |||
+ | **Why is it useful to monitor this?** | ||
+ | |||
+ | One would expect that the company affected by a ransomware attack would be the first to know about it. However, there are scenarios why this should be monitored: | ||
+ | |||
+ | * Some companies are decentralized with different subsidiaries. The flow of information to a central location does not always work. In such cases, monitoring helps to keep track of the situation, even if a remote office abroad is affected by an attack. | ||
+ | * It makes sense to also include suppliers and partners in the monitoring. For example, if a partner is hit by a ransomware attack, the company itself may also be affected. In the data of the attacked company (price lists, email communication, | ||
+ | * It can also make sense for organizations to monitor ransomware hall of shame websites as a way to stay informed about the latest ransomware attacks and trends. By monitoring these websites, organizations can gain insight into the types of attacks that are being carried out, the industries and types of organizations that are being targeted, and the ransom demands that are being made. This information can help organizations to better understand the threat landscape and to take steps to protect themselves from similar attacks. | ||
+ | * Additionally, | ||
+ | |||
+ | **More information** | ||
+ | |||
+ | Please click [[ransomware_site_monitoring|here]] for more information on the search syntax. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | |||
+ | ===== Bot Monitoring ===== | ||
+ | |||
+ | |||
+ | **What is a bot or a botnet?** | ||
+ | |||
+ | Malware bots and Internet bots are a type of malware that can be programmed to hack into user accounts, search the Internet for contact information, | ||
+ | |||
+ | If an IP, host name oder username pops up in the Kaduu logs, it means it has been infected with a malicious bot. | ||
+ | |||
+ | **Where can you obtain botnet logs in the darknet?** | ||
+ | |||
+ | Botnet logs can be obtained in various darknet marketplaces, | ||
+ | |||
+ | * Tor-based marketplaces: | ||
+ | * Hacking forums: Some hacking forums, like the now-defunct Hackforum or Exploit, have a section dedicated to the sale of botnet logs. | ||
+ | * Darknet chat rooms: Some hackers use chat rooms or chat apps like Telegram to sell botnet logs. | ||
+ | |||
+ | It's important to note that access to these sites and marketplaces can be challenging and they are often hidden and may require specific software or knowledge to access them. Additionally, | ||
+ | |||
+ | It's also important to note that accessing these sites and attempting to purchase botnet logs is illegal in most countries, and could lead to serious consequences such as civil or criminal charges. Additionally, | ||
+ | |||
+ | |||
+ | **What type of devices are more likely to be infected with bots?** | ||
+ | |||
+ | Malicious bots, also known as malware bots or botnets, can infect a wide range of devices, including personal computers, servers, and mobile devices. However, certain types of devices and users are more likely to be targeted than others. It is much more unlikely that public servers are infected with bots opposite to private computers. Here are the most exposed device types: | ||
+ | |||
+ | * Personal computers: Home users are often targeted by botnets because they may have weaker security protections in place than organizations. Additionally, | ||
+ | * Servers: Businesses and organizations that operate servers are also at risk of botnet infections, particularly those that have a significant online presence, such as e-commerce websites or web hosting companies. | ||
+ | * Internet of Things (IoT) devices: The increasing popularity of IoT devices, such as smart cameras, routers, and home automation systems, has led to a rise in botnet infections targeting these devices. IoT devices often have weaker security protections and are easily compromised, | ||
+ | * Mobile devices: Mobile devices can also be infected with botnets, particularly those that run on older or unpatched versions of the operating system. This can happen through infected apps, which are downloaded from non-official stores, or through infected webpages which are visited using the mobile browser. | ||
+ | |||
+ | |||
+ | **How are bot logs accessible in Kaduu?** | ||
+ | |||
+ | There are two search pages: | ||
+ | |||
+ | - **Bot Record Search:** On the bot records search page you can search in a database of indexed stealer bot records. The information is collected from stealer (trojan) logs distributed on hacker forums and marketplaces. This index is different from bot search, as it indexes separate records. | ||
+ | - **Bot Search:** On this page you can search in a database of indexed stealer bot records. The information is collected from stealer (trojan) logs distributed on hacker forums and marketplaces. | ||
+ | |||
+ | |||
+ | **Bot Record Details** | ||
+ | |||
+ | If you want to see the details of the bot records, please click on the IP address. You will the see the path of the file, that lead to the malware infection. More details about the user, the internet history and web calls will be also visible. | ||
+ | |||
+ | **More information** | ||
+ | |||
+ | Please click [[bot_search|here]] for more information on the search syntax. | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Darknet .Onion & I2P Live Search ===== | ||
+ | |||
+ | **What can you discover on .onion websites in the darknet?** | ||
+ | |||
+ | Onion websites are websites that are hosted on the Tor network, a network that is designed to provide anonymity and privacy for its users. These websites are not accessible through regular web browsers and can only be accessed using the Tor Browser or another tool that is capable of connecting to the Tor network. | ||
+ | |||
+ | On .onion websites, you can find a wide range of illegal and illicit goods and services, including: | ||
+ | |||
+ | * Stolen credit card and personal information | ||
+ | * Illegal drugs and weapons | ||
+ | * Hacking tools and services | ||
+ | * Counterfeit goods | ||
+ | * Fraudulent services such as phishing and scams | ||
+ | * Child pornography | ||
+ | * Ransomware-as-a-service | ||
+ | * Additionally, | ||
+ | |||
+ | **How reliable is a darknet search on onion websites and how much fata can you actually find?** | ||
+ | |||
+ | Searching the darknet, specifically the Tor network, can be challenging and the reliability of the information found on .onion websites can vary greatly. Because the darknet is not indexed by traditional search engines, finding specific information or sites can be difficult without knowing the exact web address or a specific link to follow. | ||
+ | |||
+ | Additionally, | ||
+ | |||
+ | As for the amount of data you can find, it depends on what you are looking for. Some .onion websites may have a lot of information available, while others may be more limited. Additionally, | ||
+ | |||
+ | **How to use Live Search in Kaduu?** | ||
+ | |||
+ | On the Kaduu dashboard live search page you can search multiple (10+) darknet and clearnet search engines in live mode. Words you enter in the query field will be directly forwarded to multiple external search engines, so we suggest using only simple phrases - a company, person or domain name. | ||
+ | Set " | ||
+ | |||
+ | It may take up to a few minutes to get all results, as we will be requesting multiple external resources over proxy servers, TOR and I2P networks, which may be very slow. | ||
+ | |||
+ | **Were do we search?** | ||
+ | |||
+ | We use a number of proxies and darknet search engines to search for the term. The respective search engine is displayed after entering the search term. | ||
+ | |||
+ | **What does it mean if my company or keyword shows up in the search?** | ||
+ | |||
+ | The fact that your organization is mentioned on a darknet site does not necessarily mean that you are at risk. Some legitimate news and websites are mirrored on the darknet. However, the mention of your organization may indicate the preparation of an attack or even a successful attack. We therefore ask you to investigate the above-mentioned results and, if necessary, take the necessary steps | ||
+ | |||
+ | **More information** | ||
+ | |||
+ | Please click [[live_search|here]] for more information on the search syntax. | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== E-Mail Monitoring ===== | ||
+ | |||
+ | |||
+ | **Introduction** | ||
+ | |||
+ | A phishing attack against your employees is usually preceded by a short phase of reconnaissance of the targets. In targeted spear phishing attacks, fraudsters often take data from employees’ social media profiles. There are also email lists offered in hacker forums, and lastly, there are a number of hacking tools that search the Internet and Dark Web for information on the targets. | ||
+ | |||
+ | Higher-ranking CEOs & C-suite executives are usually more exposed to the public (their profile can often be found on the organization’s website), making them easier targets. For all other departments and employee types, it is difficult to assess the steps an attacker has to take to gather the information they need to reach their target. Only if you venture to perform the same information gathering as the hacker, can you assess the risk of your employees getting exposed to phishing attacks. The greater an employee’s exposure on the Internet or Dark Web, the higher the likelihood of them becoming a victim of a social engineering attack, like phishing. Employees who register with their names and business email accounts on private websites put the whole organization at risk as this gives the hacker a bigger attack surface. | ||
+ | |||
+ | **What is monitored? | ||
+ | |||
+ | In Kaduu, we measure each employee’s exposure on the Internet and note where indications of activities related to the specific email account can be found. We try to find the employee’s email address on the Internet, Deep Web or Dark Net and list the according email references from the websites where we found the account. We then try to investigate how often the email is referenced in different unique sources. The more sources, the bigger the exposure. | ||
+ | |||
+ | **What is the benefit?** | ||
+ | |||
+ | Everything that helps you reduce your attack surface can also limit future breaches. If you find any employee’s business email account on private websites, you will be able to create targeted user awareness training that helps them understand the consequences of such an exposure. | ||
+ | |||
+ | **How does it work?** | ||
+ | |||
+ | We have two type of searches: | ||
+ | |||
+ | * (1) Database search: Kaduu runs a crawler in the background collecting any email adress it finds. This crawler is not looking for any specific email domain, but collects everything. Therefore the data set might be very limited to a specific account. | ||
+ | * (2) External Search: The external Search will connect to an external authenticated API that will query specificly the domain you entered. You will find more results using the external search. | ||
+ | |||
+ | In both cases you need to enter the company domain with the syntax " | ||
+ | |||
+ | ---- | ||
+ | |||
+ | |||
+ | ===== Discord Monitoring ===== | ||
+ | |||
+ | |||
+ | Discord is a popular communication platform designed for online communities and gamers. It offers a variety of features including text, voice and video chat, file sharing, and gaming integrations. Discord is available as a browser-based web app, a desktop app for Windows, MacOS, Linux and as mobile apps for iOS and Android. The platform allows users to create and join virtual servers (also called " | ||
+ | |||
+ | **How is Discord used by hackers?** | ||
+ | |||
+ | Discord can be used by hackers in various ways, including: | ||
+ | |||
+ | * Sharing hacking tools and tutorials: Discord servers can be used as platforms to share hacking tools and tutorials with other individuals. | ||
+ | * Coordinating attacks: Hackers can use Discord channels to coordinate and execute attacks on websites, networks, or other targets. | ||
+ | * Phishing and scamming: Hackers may use Discord to phish personal information or scam users through fake giveaways or other deceitful means. | ||
+ | * Spreading malware: Hackers can spread malware through links or files shared on Discord servers, infecting other users' devices. | ||
+ | |||
+ | **How many channels exist?** | ||
+ | |||
+ | It's not possible to determine the exact number of Discord channels that exist, as the platform allows for an unlimited number of servers and channels to be created. The number of Discord channels continues to grow as new servers are created and existing servers add new channels. Discord has over 150 million monthly active users, so there are likely a large number of channels across all the servers on the platform. | ||
+ | |||
+ | **What channels do we monitor?** | ||
+ | |||
+ | * " | ||
+ | * " | ||
+ | * " | ||
+ | * "A9 Market": | ||
+ | * "Rent 8 hacker": | ||
+ | * " | ||
+ | * " | ||
+ | * " | ||
+ | * "Evil Empire": | ||
+ | * "Alka Tim": https:// | ||
+ | * "Dark Matter Market": | ||
+ | * " | ||
+ | * "Anon Cyber Team": https:// | ||
+ | * " | ||
+ | * " | ||
+ | * " | ||
+ | * " | ||
+ | * and many more | ||
+ | |||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== Passive Vulerability Detection ===== | ||
+ | |||
+ | In Kaduu we use a passive vulnerability detection approach. Passive Vulnerability Detection and Active Vulnerability Detection are two methods used to identify security vulnerabilities in a network or system. | ||
+ | |||
+ | * Passive Vulnerability Detection is a method of identifying vulnerabilities without actively interacting with the system or network being tested. This is typically done by analyzing system logs, network traffic, or other passively generated data. In case of Kaduu we query databases in the deep web that may contain data on the target. The advantage of passive vulnerability detection is that it doesn' | ||
+ | * | ||
+ | * Active Vulnerability Detection, on the other hand, involves actively interacting with the system or network being tested to identify vulnerabilities. This typically involves running scans, probes, or penetration tests to identify potential security weaknesses. The advantage of active vulnerability detection is that it can provide a more comprehensive view of the system' | ||
+ | |||
+ | **How to use this feature?** | ||
+ | |||
+ | For the infrastructure search we need the domain (example.com and not www.example.com) as input. You can't search for IP's or other elements, because based on the domain we first find out via databases, which subdomains all belong to the main domain. We get data from Dnsdumpster, | ||
+ | |||
+ | |||
+ | **How do we present the data?** | ||
+ | For every host we find we do a reverse DNS lookup and query databases like Shodan in order to find information about open ports, used applications or vulnerabilities (CVE). | ||