User Tools

Site Tools


start

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revision Previous revision
Next revision
Previous revision
start [2023/06/06 12:08]
kaduuwikiadmin
start [2025/04/14 11:22] (current)
kaduuwikiadmin [RANSOMWARE MONITORING]
Line 32: Line 32:
  
 ==== ACTIVE DOMAIN RESEARCH ==== ==== ACTIVE DOMAIN RESEARCH ====
 +
 +Passive Domain monitoring involves monitoring publicly available databases of registered domains. However, since ccTLDs are not obliged to make the registered domains available to the public, entries for new domains are not found at all or with a delay of weeks. For this reason we offer additionally an active monitoring of typo-squatted domain variations. You can enter your own domain here and we will generate around 7000 variations of this domain as commonly used by hackers. This list of domains is then pro-actively monitored for active DNS entries on a daily basis.
  
   * [[Domain Live Typosquatting Search]]   * [[Domain Live Typosquatting Search]]
  
 ==== SSL MONITORING ==== ==== SSL MONITORING ====
 +
 +We monitor all SSL certificate transperency logs since many phishing websites are secured with SSL certificates to spoof the legitimate client’s name. By monitoring the certificate transparency logs that are available online, you can detect if your organization’s name gets spoofed on SSL certificates – even in the subdomain part of the domain.
  
   * [[Certificate Monitoring]]   * [[Certificate Monitoring]]
Line 89: Line 93:
  
   * [[URL Shortener Monitoring]]   * [[URL Shortener Monitoring]]
 +
 +URL shortening services are online tools that take a long and complex URL and shorten it to a much shorter, more manageable length as shorter URLs are easier to remember, share, and type. However, URL shorteners can also be used maliciously by hackers to conceal the destination of a link and trick users into clicking on a malicious or phishing link. A study conducted by Cornell University found that out of 2.2 million URLs, 61% of the URLs used in phishing attacks were shortened links. But the risk is not onlylimited to hackers. Any cloud storage service and OneDrive in particular used to generate short URLs for documents and folders using the 1drv.ms domain. This is a “branded short domain” operated by Bitly and uses the same tokens as bit.ly. Searching by any cloud service domain (dropbox.com, drive.google.com), reveals a lot of downloadable files.
  
 ==== EMPLOYEES EXPOSURE ==== ==== EMPLOYEES EXPOSURE ====
Line 145: Line 151:
  
 **ACCESS & EXPORT DATA** **ACCESS & EXPORT DATA**
 +  * [[How to get to the data in Kaduu - Introduction]] 
   * [[Export to CSV, XML etc]]    * [[Export to CSV, XML etc]] 
   * [[Create MS-Word based report (.Docx)]]   * [[Create MS-Word based report (.Docx)]]
Line 162: Line 169:
   * [[Can you search for more than one keyword at the same time?]]    * [[Can you search for more than one keyword at the same time?]] 
   * [[Simple vs Expert Mode]]   * [[Simple vs Expert Mode]]
 +  * [[Risk classifications]]
 +  * [[What are the meanings of the different date fields?]]
 +  * [[What is the difference between live and DB search?]]
 +
 +
 +**CENTRAL API**
  
 +* [[Darknet and Deepweb Risk Score]]  
  
start.1686046118.txt.gz · Last modified: 2023/06/06 12:08 by kaduuwikiadmin