This shows you the differences between two versions of the page.
Next revision | Previous revision | ||
public_ip_s_and_passive_vulnerability_monitoring [2023/01/29 14:39] 178.238.165.56 created |
public_ip_s_and_passive_vulnerability_monitoring [2023/05/22 20:40] (current) |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | Coming soon (Beginning February 2023) | + | ====== Passive Vulerability Detection ====== |
+ | |||
+ | In Kaduu we use a passive vulnerability detection approach. Passive Vulnerability Detection and Active Vulnerability Detection are two methods used to identify security vulnerabilities in a network or system. | ||
+ | |||
+ | * Passive Vulnerability Detection is a method of identifying vulnerabilities without actively interacting with the system or network being tested. This is typically done by analyzing system logs, network traffic, or other passively generated data. In case of Kaduu we query databases in the deep web that may contain data on the target. The advantage of passive vulnerability detection is that it doesn' | ||
+ | |||
+ | * Active Vulnerability Detection, on the other hand, involves actively interacting with the system or network being tested to identify vulnerabilities. This typically involves running scans, probes, or penetration tests to identify potential security weaknesses. The advantage of active vulnerability detection is that it can provide a more comprehensive view of the system' | ||
+ | |||
+ | ===== How to use this feature? ===== | ||
+ | |||
+ | For the infrastructure search we need the domain | ||
+ | |||
+ | |||
+ | ===== How do we present the data? ===== | ||
+ | |||
+ | For every host we find we do a reverse DNS lookup and query databases like Shodan in order to find information about open ports, used applications or vulnerabilities (CVE). | ||
+ | |||
+ | {{:: |