This shows you the differences between two versions of the page.
Both sides previous revision Previous revision Next revision | Previous revision | ||
start [2023/06/06 12:05] kaduuwikiadmin |
start [2025/04/14 11:22] (current) kaduuwikiadmin [RANSOMWARE MONITORING] |
||
---|---|---|---|
Line 32: | Line 32: | ||
==== ACTIVE DOMAIN RESEARCH ==== | ==== ACTIVE DOMAIN RESEARCH ==== | ||
+ | |||
+ | Passive Domain monitoring involves monitoring publicly available databases of registered domains. However, since ccTLDs are not obliged to make the registered domains available to the public, entries for new domains are not found at all or with a delay of weeks. For this reason we offer additionally an active monitoring of typo-squatted domain variations. You can enter your own domain here and we will generate around 7000 variations of this domain as commonly used by hackers. This list of domains is then pro-actively monitored for active DNS entries on a daily basis. | ||
* [[Domain Live Typosquatting Search]] | * [[Domain Live Typosquatting Search]] | ||
==== SSL MONITORING ==== | ==== SSL MONITORING ==== | ||
+ | |||
+ | We monitor all SSL certificate transperency logs since many phishing websites are secured with SSL certificates to spoof the legitimate client’s name. By monitoring the certificate transparency logs that are available online, you can detect if your organization’s name gets spoofed on SSL certificates – even in the subdomain part of the domain. | ||
* [[Certificate Monitoring]] | * [[Certificate Monitoring]] | ||
Line 67: | Line 71: | ||
* [[Code Monitoring]] | * [[Code Monitoring]] | ||
- | Code Monitoring: Kaduu allows you to capture search terms and check their publication on publicly available Github, SourceForge, | + | Code Monitoring: Kaduu allows you to capture search terms and check their publication on publicly available Github, SourceForge, |
- | Data leakage: If an organization uses a code sharing software to store sensitive data, such as source code, login credentials, | + | * [[Bucket Monitoring]] |
- | Insider threats: If an organization uses a code sharing softwareto collaborate on projects, there is a risk that an employee or contractor may intentionally or accidentally cause a data breach, for example | + | Many enterprises continue to leave cloud storage buckets unprotected, even though extensive documentation |
+ | Configuration errors or failures that allow malicious users to access | ||
+ | Lack of understanding of what data is stored in S3 buckets and if protection for that specific data is adequate | ||
+ | Configuration problems that allow bad actors | ||
- | Third-party risks: If an organization uses a code sharing software to collaborate with third-party vendors or open-source contributors, | + | * [[Public IP' |
- | Malicious code injection: If an organization uses a code sharing software to manage their software development, | + | Passive Vulnerability Detection |
- | Phishing and Social engineering: | + | * [[Paste & Git Monitoring]] |
- | Compromised dependencies: | + | Pastebin and other similar sites allow users to share text in the form of public posts called " |
- | Google Dork Monitoring: Google hacking, a | + | * [[Google Dork Monitoring]] |
- | + | ||
- | Sensitive information: | + | |
- | + | ||
- | Vulnerable files and directories: | + | |
- | + | ||
- | Misconfigured servers: Google hacking can be used to search for servers that have been misconfigured, | + | |
- | + | ||
- | Backdoors: Google hacking can be used to search for backdoors, which are small programs that can be used to gain unauthorized access to a system. | + | |
- | + | ||
- | Open ports: Google hacking can be used to search for open ports on a network, which can indicate a vulnerability that can be exploited by attackers. | + | |
- | Exposed databases: | + | Google hacking, also known as Google dorking, is the practice of using advanced operators in the Google search engine to find security vulnerabilities in websites. These operators can be used to search for specific file types, sensitive information, |
- | * [[Bucket Monitoring]] | ||
- | * [[Public IP's and passive Vulnerability Monitoring]] | ||
- | * [[Paste & Git Monitoring]] | ||
- | * [[Google Dork Monitoring]] | ||
* [[URL Shortener Monitoring]] | * [[URL Shortener Monitoring]] | ||
+ | |||
+ | URL shortening services are online tools that take a long and complex URL and shorten it to a much shorter, more manageable length as shorter URLs are easier to remember, share, and type. However, URL shorteners can also be used maliciously by hackers to conceal the destination of a link and trick users into clicking on a malicious or phishing link. A study conducted by Cornell University found that out of 2.2 million URLs, 61% of the URLs used in phishing attacks were shortened links. But the risk is not onlylimited to hackers. Any cloud storage service and OneDrive in particular used to generate short URLs for documents and folders using the 1drv.ms domain. This is a “branded short domain” operated by Bitly and uses the same tokens as bit.ly. Searching by any cloud service domain (dropbox.com, | ||
==== EMPLOYEES EXPOSURE ==== | ==== EMPLOYEES EXPOSURE ==== | ||
Line 156: | Line 151: | ||
**ACCESS & EXPORT DATA** | **ACCESS & EXPORT DATA** | ||
+ | * [[How to get to the data in Kaduu - Introduction]] | ||
* [[Export to CSV, XML etc]] | * [[Export to CSV, XML etc]] | ||
* [[Create MS-Word based report (.Docx)]] | * [[Create MS-Word based report (.Docx)]] | ||
Line 173: | Line 169: | ||
* [[Can you search for more than one keyword at the same time? | * [[Can you search for more than one keyword at the same time? | ||
* [[Simple vs Expert Mode]] | * [[Simple vs Expert Mode]] | ||
+ | * [[Risk classifications]] | ||
+ | * [[What are the meanings of the different date fields?]] | ||
+ | * [[What is the difference between live and DB search?]] | ||
+ | |||
+ | |||
+ | **CENTRAL API** | ||
+ | * [[Darknet and Deepweb Risk Score]] | ||