User Tools

Site Tools


functionality_overview

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
functionality_overview [2023/01/29 09:14]
178.238.165.56
functionality_overview [2023/05/22 20:40] (current)
Line 481: Line 481:
 ---- ----
  
-====== E-Mail Monitoring ======+===== E-Mail Monitoring ===== 
  
 **Introduction** **Introduction**
Line 493: Line 494:
 In Kaduu, we measure each employee’s exposure on the Internet and note where indications of activities related to the specific email account can be found. We try to find the employee’s email address on the Internet, Deep Web or Dark Net and list the according email references from the websites where we found the account. We then try to investigate how often the email is referenced in different unique sources. The more sources, the bigger the exposure. In Kaduu, we measure each employee’s exposure on the Internet and note where indications of activities related to the specific email account can be found. We try to find the employee’s email address on the Internet, Deep Web or Dark Net and list the according email references from the websites where we found the account. We then try to investigate how often the email is referenced in different unique sources. The more sources, the bigger the exposure.
  
-===== What is the benefit? =====+**What is the benefit?**
  
 Everything that helps you reduce your attack surface can also limit future breaches. If you find any employee’s business email account on private websites, you will be able to create targeted user awareness training that helps them understand the consequences of such an exposure. Everything that helps you reduce your attack surface can also limit future breaches. If you find any employee’s business email account on private websites, you will be able to create targeted user awareness training that helps them understand the consequences of such an exposure.
Line 506: Line 507:
 In both cases you need to enter the company domain with the syntax "domain.com". Please use the TLD used for your email accounts. In both cases you need to enter the company domain with the syntax "domain.com". Please use the TLD used for your email accounts.
  
 +----
 +
 +
 +===== Discord Monitoring =====
 +
 +
 +Discord is a popular communication platform designed for online communities and gamers. It offers a variety of features including text, voice and video chat, file sharing, and gaming integrations. Discord is available as a browser-based web app, a desktop app for Windows, MacOS, Linux and as mobile apps for iOS and Android. The platform allows users to create and join virtual servers (also called "Discord servers") to connect with others based on common interests.
 +
 +**How is Discord used by hackers?**
 +
 +Discord can be used by hackers in various ways, including:
 +
 +  * Sharing hacking tools and tutorials: Discord servers can be used as platforms to share hacking tools and tutorials with other individuals.
 +  * Coordinating attacks: Hackers can use Discord channels to coordinate and execute attacks on websites, networks, or other targets.
 +  * Phishing and scamming: Hackers may use Discord to phish personal information or scam users through fake giveaways or other deceitful means.
 +  * Spreading malware: Hackers can spread malware through links or files shared on Discord servers, infecting other users' devices.
 +
 +**How many channels exist?**
 +
 +It's not possible to determine the exact number of Discord channels that exist, as the platform allows for an unlimited number of servers and channels to be created. The number of Discord channels continues to grow as new servers are created and existing servers add new channels. Discord has over 150 million monthly active users, so there are likely a large number of channels across all the servers on the platform.
 +
 +**What channels do we monitor?**
 +
 +  * "Blackhats underground": https://discord.gg/k8Jxuu66gX- dumps
 +  * "PirateShips CCs Shop": https://discord.gg/kVv58B63g2 - credit cards
 +  * "DarkSec": https://discord.com/invite/wTQa64JhJY - Hacking group
 +  * "A9 Market": https://discord.gg/a9market - credit cards
 +  * "Rent 8 hacker": https://discord.gg/cUTadTRNh9 - Rent a hacker
 +  * "sPlug": https://discord.gg/pzYzqcJtzz - PII data
 +  * "DarkCat.exe": https://discord.gg/2aW8KBEKxt
 +  * "Anonymity": https://discord.gg/2trMf94kPB
 +  * "Evil Empire": https://discord.gg/QVQA4duZ9M - Phishing, stealer logs
 +  * "Alka Tim": https://discord.gg/PrnUNDgRAN -  Turkish hacking team
 +  * "Dark Matter Market": https://discord.gg/VTWxZhDEvG
 +  * "Trisoft vlan": https://discord.gg/ErDj63yY - ;Malware talks
 +  * "Anon Cyber Team": https://discord.gg/jac3w4sGXq
 +  * "Netcat hacking": https://discord.gg/2rU7t5bEY5
 +  * "Backward Development": https://discord.gg/8gRcfgvtVK
 +  * "Oversec": https://discord.gg/cwxvPWtdsj - another turkish hacking group
 +  * "Christian Hacking club": https://discord.gg/qJyzCTEAkC - mostly news from cybersec world
 +  * and many more
 +
 +
 +----
 +
 +===== Passive Vulerability Detection =====
 +
 +In Kaduu we use a passive vulnerability detection approach. Passive Vulnerability Detection and Active Vulnerability Detection are two methods used to identify security vulnerabilities in a network or system.
 +
 +  * Passive Vulnerability Detection is a method of identifying vulnerabilities without actively interacting with the system or network being tested. This is typically done by analyzing system logs, network traffic, or other passively generated data. In case of Kaduu we query databases in the deep web that may contain data on the target. The advantage of passive vulnerability detection is that it doesn't disrupt the normal operation of the system and can be done without the target's knowledge. However, passive detection may miss some vulnerabilities that can only be detected through active interaction with the system.
 +  * 
 +  * Active Vulnerability Detection, on the other hand, involves actively interacting with the system or network being tested to identify vulnerabilities. This typically involves running scans, probes, or penetration tests to identify potential security weaknesses. The advantage of active vulnerability detection is that it can provide a more comprehensive view of the system's vulnerabilities and can help confirm the findings from passive detection. However, active vulnerability detection can be disruptive to the system's normal operation and may require prior permission from the target.
 +
 +**How to use this feature?**
 +
 +For the infrastructure search we need the domain (example.com and not www.example.com) as input. You can't search for IP's or other elements, because based on the domain we first find out via databases, which subdomains all belong to the main domain. We get data from Dnsdumpster, Shodan but also Certificate transparency logs. We thus recreate the infrastructure as a hacker will see it, without performing active scans. For all elements found, we then search the deep web again to see if any information about open ports or vulnerabilities can be found. Again, no scans take place.
 +
 +
 +**How do we present the data?**
 +
 +For every host we find we do a reverse DNS lookup and query databases like Shodan in order to find information about open ports, used applications or vulnerabilities (CVE).
  
  
functionality_overview.1674980082.txt.gz · Last modified: 2023/05/22 20:40 (external edit)