This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
start [2023/06/06 11:34] kaduuwikiadmin |
start [2025/04/14 11:22] (current) kaduuwikiadmin [RANSOMWARE MONITORING] |
||
---|---|---|---|
Line 32: | Line 32: | ||
==== ACTIVE DOMAIN RESEARCH ==== | ==== ACTIVE DOMAIN RESEARCH ==== | ||
+ | |||
+ | Passive Domain monitoring involves monitoring publicly available databases of registered domains. However, since ccTLDs are not obliged to make the registered domains available to the public, entries for new domains are not found at all or with a delay of weeks. For this reason we offer additionally an active monitoring of typo-squatted domain variations. You can enter your own domain here and we will generate around 7000 variations of this domain as commonly used by hackers. This list of domains is then pro-actively monitored for active DNS entries on a daily basis. | ||
* [[Domain Live Typosquatting Search]] | * [[Domain Live Typosquatting Search]] | ||
==== SSL MONITORING ==== | ==== SSL MONITORING ==== | ||
+ | |||
+ | We monitor all SSL certificate transperency logs since many phishing websites are secured with SSL certificates to spoof the legitimate client’s name. By monitoring the certificate transparency logs that are available online, you can detect if your organization’s name gets spoofed on SSL certificates – even in the subdomain part of the domain. | ||
* [[Certificate Monitoring]] | * [[Certificate Monitoring]] | ||
Line 55: | Line 59: | ||
===== DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES ===== | ===== DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES ===== | ||
+ | This feature addresses a significant and often overlooked cyber risk: sensitive data leakage. In numerous instances, developers and freelancers inadvertently deposit sensitive configurations, | ||
- | ==== EXPOSED INFRASTRUCTURE OR DATA IN DEEPWEB ==== | + | Such exposure of sensitive data puts your organization at a heightened risk of targeted cyber attacks. Opportunistic hackers can easily scour these public repositories, |
+ | In addition, our product also protects against the threats lurking within specialized search engines like Shodan. These platforms often expose details about potentially unsecured servers, shadow IT, and vulnerabilities within your applications. | ||
+ | |||
+ | In essence, this module provides a robust solution to safeguard your organization against sensitive data leakage and targeted cyber threats, enhancing your overall cybersecurity resilience | ||
+ | |||
+ | ==== EXPOSED INFRASTRUCTURE OR DATA IN DEEPWEB ==== | ||
* [[Code Monitoring]] | * [[Code Monitoring]] | ||
+ | |||
+ | Code Monitoring: Kaduu allows you to capture search terms and check their publication on publicly available Github, SourceForge, | ||
+ | |||
* [[Bucket Monitoring]] | * [[Bucket Monitoring]] | ||
+ | |||
+ | Many enterprises continue to leave cloud storage buckets unprotected, | ||
+ | Configuration errors or failures that allow malicious users to access sensitive data in S3 buckets | ||
+ | Lack of understanding of what data is stored in S3 buckets and if protection for that specific data is adequate | ||
+ | Configuration problems that allow bad actors to upload malware to S3 buckets, and potentially create a baseline that they can use for further attacks. | ||
+ | |||
* [[Public IP's and passive Vulnerability Monitoring]] | * [[Public IP's and passive Vulnerability Monitoring]] | ||
+ | |||
+ | Passive Vulnerability Detection is a method of identifying vulnerabilities without actively interacting with the system or network being tested. This is typically done by analyzing system logs, network traffic, or other passively generated data. In case of Kaduu we query databases in the deep web that may contain data on the target. The advantage of passive vulnerability detection is that it doesn' | ||
+ | |||
* [[Paste & Git Monitoring]] | * [[Paste & Git Monitoring]] | ||
+ | |||
+ | Pastebin and other similar sites allow users to share text in the form of public posts called " | ||
+ | |||
* [[Google Dork Monitoring]] | * [[Google Dork Monitoring]] | ||
+ | |||
+ | Google hacking, also known as Google dorking, is the practice of using advanced operators in the Google search engine to find security vulnerabilities in websites. These operators can be used to search for specific file types, sensitive information, | ||
+ | |||
* [[URL Shortener Monitoring]] | * [[URL Shortener Monitoring]] | ||
+ | |||
+ | URL shortening services are online tools that take a long and complex URL and shorten it to a much shorter, more manageable length as shorter URLs are easier to remember, share, and type. However, URL shorteners can also be used maliciously by hackers to conceal the destination of a link and trick users into clicking on a malicious or phishing link. A study conducted by Cornell University found that out of 2.2 million URLs, 61% of the URLs used in phishing attacks were shortened links. But the risk is not onlylimited to hackers. Any cloud storage service and OneDrive in particular used to generate short URLs for documents and folders using the 1drv.ms domain. This is a “branded short domain” operated by Bitly and uses the same tokens as bit.ly. Searching by any cloud service domain (dropbox.com, | ||
==== EMPLOYEES EXPOSURE ==== | ==== EMPLOYEES EXPOSURE ==== | ||
Line 121: | Line 151: | ||
**ACCESS & EXPORT DATA** | **ACCESS & EXPORT DATA** | ||
+ | * [[How to get to the data in Kaduu - Introduction]] | ||
* [[Export to CSV, XML etc]] | * [[Export to CSV, XML etc]] | ||
* [[Create MS-Word based report (.Docx)]] | * [[Create MS-Word based report (.Docx)]] | ||
Line 138: | Line 169: | ||
* [[Can you search for more than one keyword at the same time? | * [[Can you search for more than one keyword at the same time? | ||
* [[Simple vs Expert Mode]] | * [[Simple vs Expert Mode]] | ||
+ | * [[Risk classifications]] | ||
+ | * [[What are the meanings of the different date fields?]] | ||
+ | * [[What is the difference between live and DB search?]] | ||
+ | |||
+ | |||
+ | **CENTRAL API** | ||
+ | * [[Darknet and Deepweb Risk Score]] | ||