This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
start [2023/06/04 18:11] kaduuwikiadmin |
start [2025/04/14 11:22] (current) kaduuwikiadmin [RANSOMWARE MONITORING] |
||
---|---|---|---|
Line 1: | Line 1: | ||
- | ====== WIKI DIRECTORY | + | ====== |
Welcome to Kaduu Wiki. Kaduu is a SaaS based platform offering Darknet & Deep Web monitoring. You can find more information about the product here [[https:// | Welcome to Kaduu Wiki. Kaduu is a SaaS based platform offering Darknet & Deep Web monitoring. You can find more information about the product here [[https:// | ||
Line 8: | Line 9: | ||
===== FUNCTIONALITY: | ===== FUNCTIONALITY: | ||
- | In today' | + | |
- | Cyber attackers often employ strategies like typo squatting, a tactic where they register domains that closely resemble legitimate ones. An example would be an attacker targeting a bank and registering a domain like ' | + | In today' |
- | That's where our Threat Intelligence Product steps in. It vigilantly monitors all new global domain registrations for similarities to your own. This proactive approach helps identify potential threats at their genesis, allowing you to thwart an attack before it materializes. | + | |
- | However, attackers can be crafty, often embedding your organization' | + | Cyber attackers often employ strategies like typo squatting, a tactic where they register domains that closely resemble legitimate ones. An example would be an attacker targeting a bank and registering a domain like ' |
- | Our product enhances your defense by not only tracking domain registrations but also by monitoring SSL Transparency logs, allowing you to also detect your domain name within the subdomain part of a malicious URL. SSL Transparency logs are public records maintained by SSL providers detailing each SSL certificate issued. Scrutinizing these logs aids in unmasking potential hidden threats lurking in the subdomains. | + | |
- | Further fortifying your cyber defense, our product integrates information from resources like PhishTank, OpenPhish and similar sources. These repositories maintain a global database of URLs reported for phishing or disseminating malware, allowing us to also detect your company or brand name within a directory of a URL. | + | That's where our Threat Intelligence Product steps in. It vigilantly monitors all new global domain registrations for similarities to your own. This proactive approach helps identify potential threats at their genesis, allowing you to thwart an attack before it materializes.\\\\ |
+ | |||
+ | However, attackers can be crafty, often embedding your organization' | ||
+ | |||
+ | Our product enhances your defense by not only tracking domain registrations but also by monitoring SSL Transparency logs, allowing you to also detect your domain name within the subdomain part of a malicious URL. SSL Transparency logs are public records maintained by SSL providers detailing each SSL certificate issued. Scrutinizing these logs aids in unmasking potential hidden threats lurking in the subdomains.\\\\ | ||
+ | |||
+ | Further fortifying your cyber defense, our product integrates information from resources like PhishTank, OpenPhish and similar sources. These repositories maintain a global database of URLs reported for phishing or disseminating malware, allowing us to also detect your company or brand name within a directory of a URL.\\ | ||
By amalgamating these varied sources of intelligence, | By amalgamating these varied sources of intelligence, | ||
- | '' | + | ==== PASSIVE DOMAIN RESEARCH IN EXPERT MODE ==== |
* [[Domain Database Search]] | * [[Domain Database Search]] | ||
* [[Domain Info Lookup]] | * [[Domain Info Lookup]] | ||
* [[Creating alerts based on your search]] | * [[Creating alerts based on your search]] | ||
- | '' | + | ==== ACTIVE DOMAIN RESEARCH |
+ | |||
+ | Passive Domain monitoring involves monitoring publicly available databases of registered domains. However, since ccTLDs are not obliged to make the registered domains available to the public, entries for new domains are not found at all or with a delay of weeks. For this reason we offer additionally an active monitoring of typo-squatted domain variations. You can enter your own domain here and we will generate around 7000 variations of this domain as commonly used by hackers. This list of domains is then pro-actively monitored for active DNS entries on a daily basis. | ||
* [[Domain Live Typosquatting Search]] | * [[Domain Live Typosquatting Search]] | ||
- | '' | + | ==== SSL MONITORING |
+ | |||
+ | We monitor all SSL certificate transperency logs since many phishing websites are secured with SSL certificates to spoof the legitimate client’s name. By monitoring the certificate transparency logs that are available online, you can detect if your organization’s name gets spoofed on SSL certificates – even in the subdomain part of the domain. | ||
* [[Certificate Monitoring]] | * [[Certificate Monitoring]] | ||
- | '' | + | ==== 3RD PARTY PHISHING AND MALWARE REPORTS |
* [[Phish Feed Monitoring]] | * [[Phish Feed Monitoring]] | ||
- | '' | + | ==== SOCIAL MEDIA SPOOFING |
* [[Social Media Spoofing]] | * [[Social Media Spoofing]] | ||
- | '' | + | ==== MOBILE APP SPOOFING |
* [[App Spoofing]] | * [[App Spoofing]] | ||
---- | ---- | ||
- | **DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES** | + | ===== DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES |
+ | |||
+ | This feature addresses a significant and often overlooked cyber risk: sensitive data leakage. In numerous instances, developers and freelancers inadvertently deposit sensitive configurations, | ||
+ | |||
+ | Such exposure of sensitive data puts your organization at a heightened risk of targeted cyber attacks. Opportunistic hackers can easily scour these public repositories, | ||
+ | |||
+ | In addition, our product also protects against the threats lurking within specialized search engines like Shodan. These platforms often expose details about potentially unsecured servers, shadow IT, and vulnerabilities within your applications. | ||
+ | |||
+ | In essence, this module provides a robust solution to safeguard your organization against sensitive data leakage and targeted cyber threats, enhancing your overall cybersecurity resilience | ||
+ | |||
+ | ==== EXPOSED INFRASTRUCTURE OR DATA IN DEEPWEB ==== | ||
- | '' | ||
* [[Code Monitoring]] | * [[Code Monitoring]] | ||
+ | |||
+ | Code Monitoring: Kaduu allows you to capture search terms and check their publication on publicly available Github, SourceForge, | ||
+ | |||
* [[Bucket Monitoring]] | * [[Bucket Monitoring]] | ||
+ | |||
+ | Many enterprises continue to leave cloud storage buckets unprotected, | ||
+ | Configuration errors or failures that allow malicious users to access sensitive data in S3 buckets | ||
+ | Lack of understanding of what data is stored in S3 buckets and if protection for that specific data is adequate | ||
+ | Configuration problems that allow bad actors to upload malware to S3 buckets, and potentially create a baseline that they can use for further attacks. | ||
+ | |||
* [[Public IP's and passive Vulnerability Monitoring]] | * [[Public IP's and passive Vulnerability Monitoring]] | ||
+ | |||
+ | Passive Vulnerability Detection is a method of identifying vulnerabilities without actively interacting with the system or network being tested. This is typically done by analyzing system logs, network traffic, or other passively generated data. In case of Kaduu we query databases in the deep web that may contain data on the target. The advantage of passive vulnerability detection is that it doesn' | ||
+ | |||
* [[Paste & Git Monitoring]] | * [[Paste & Git Monitoring]] | ||
+ | |||
+ | Pastebin and other similar sites allow users to share text in the form of public posts called " | ||
+ | |||
* [[Google Dork Monitoring]] | * [[Google Dork Monitoring]] | ||
+ | |||
+ | Google hacking, also known as Google dorking, is the practice of using advanced operators in the Google search engine to find security vulnerabilities in websites. These operators can be used to search for specific file types, sensitive information, | ||
+ | |||
* [[URL Shortener Monitoring]] | * [[URL Shortener Monitoring]] | ||
- | '' | + | URL shortening services are online tools that take a long and complex URL and shorten it to a much shorter, more manageable length as shorter URLs are easier to remember, share, and type. However, URL shorteners can also be used maliciously by hackers to conceal the destination of a link and trick users into clicking on a malicious or phishing link. A study conducted by Cornell University found that out of 2.2 million URLs, 61% of the URLs used in phishing attacks were shortened links. But the risk is not onlylimited to hackers. Any cloud storage service and OneDrive in particular used to generate short URLs for documents and folders using the 1drv.ms domain. This is a “branded short domain” operated by Bitly and uses the same tokens as bit.ly. Searching by any cloud service domain (dropbox.com, |
+ | |||
+ | ==== EMPLOYEES | ||
* [[E-Mail Monitoring]] | * [[E-Mail Monitoring]] | ||
Line 55: | Line 103: | ||
- | **FIND OUT IF SOMEONE TALKS ABOUT YOU IN THE DARKNET OR DEEPWEB** | + | ===== FIND OUT IF SOMEONE TALKS ABOUT YOU IN THE DARKNET OR SELLS YOUR DATA ===== |
+ | |||
+ | |||
+ | ==== DEEP WEB AND DARKNET MENTIONING ==== | ||
- | '' | ||
* [[Hacker Forum Search - Surface Web]] | * [[Hacker Forum Search - Surface Web]] | ||
* [[Telegram Hacker Channel Search]] | * [[Telegram Hacker Channel Search]] | ||
Line 66: | Line 116: | ||
---- | ---- | ||
- | **FIND OUT IF DATA HAS BEEN LEACKED** | + | ===== FIND OUT IF DATA HAS BEEN LEACKED |
+ | |||
+ | |||
+ | ==== LEAK SEARCH IN EXPERT MODE ==== | ||
- | '' | ||
* [[Leak Search]] | * [[Leak Search]] | ||
* [[Create Bookmarks]] | * [[Create Bookmarks]] | ||
- | '' | + | ==== CREDIT CARD SEARCH IN EXPERT MODE ==== |
* [[Credit Card Search]] | * [[Credit Card Search]] | ||
- | '' | + | ==== BOTNET SEARCH |
* [[Bot Search]] | * [[Bot Search]] | ||
- | '' | + | ==== RANSOMWARE MONITORING |
* [[Ransomware Site Monitoring]] | * [[Ransomware Site Monitoring]] | ||
Line 96: | Line 151: | ||
**ACCESS & EXPORT DATA** | **ACCESS & EXPORT DATA** | ||
+ | * [[How to get to the data in Kaduu - Introduction]] | ||
* [[Export to CSV, XML etc]] | * [[Export to CSV, XML etc]] | ||
* [[Create MS-Word based report (.Docx)]] | * [[Create MS-Word based report (.Docx)]] | ||
Line 113: | Line 169: | ||
* [[Can you search for more than one keyword at the same time? | * [[Can you search for more than one keyword at the same time? | ||
* [[Simple vs Expert Mode]] | * [[Simple vs Expert Mode]] | ||
+ | * [[Risk classifications]] | ||
+ | * [[What are the meanings of the different date fields?]] | ||
+ | * [[What is the difference between live and DB search?]] | ||
+ | |||
+ | |||
+ | **CENTRAL API** | ||
+ | * [[Darknet and Deepweb Risk Score]] | ||