This is an old revision of the document!
Welcome to Kaduu Wiki. Kaduu is a SaaS based platform offering Darknet & Deep Web monitoring. You can find more information about the product here https://kaduu.io. Please find below technical articles about our various features. If you have any questions, please contact support@kaduu.io.
In today's interconnected world, organizations are prime targets for cyberattacks, with phishing and malware attacks being among the most prevalent. Early detection is key, and our Threat Intelligence Product enables precisely that.
Cyber attackers often employ strategies like typo squatting, a tactic where they register domains that closely resemble legitimate ones. An example would be an attacker targeting a bank and registering a domain like 'www.bannkofexample.com'. At a quick glance, your customers or employees might not spot the difference, thus falling prey to the attacker's tactics.
That's where our Threat Intelligence Product steps in. It vigilantly monitors all new global domain registrations for similarities to your own. This proactive approach helps identify potential threats at their genesis, allowing you to thwart an attack before it materializes.
However, attackers can be crafty, often embedding your organization's name within a subdomain or a directory. For instance, they might use URLs like 'www.randomsite.com/yourbankname' or 'yourbankname.fakesite.org'. Such subtle incorporations are designed to exploit human oversight and amplify the attacker's success rate.
Our product enhances your defense by not only tracking domain registrations but also by monitoring SSL Transparency logs, allowing you to also detect your domain name within the subdomain part of a malicious URL. SSL Transparency logs are public records maintained by SSL providers detailing each SSL certificate issued. Scrutinizing these logs aids in unmasking potential hidden threats lurking in the subdomains.
Further fortifying your cyber defense, our product integrates information from resources like PhishTank, OpenPhish and similar sources. These repositories maintain a global database of URLs reported for phishing or disseminating malware, allowing us to also detect your company or brand name within a directory of a URL.
By amalgamating these varied sources of intelligence, our product provides you with comprehensive, real-time visibility into potential cyber threats.
PASSIVE DOMAIN RESEARCH IN EXPERT MODE
* Domain Database Search
* Domain Info Lookup
* Creating alerts based on your search
ACTIVE DOMAIN RESEARCH
* Domain Live Typosquatting Search
SSL MONITORING
* Certificate Monitoring
3RD PARTY PHISHING AND MALWARE REPORTS
* Phish Feed Monitoring
SOCIAL MEDIA SPOOFING
* Social Media Spoofing
MOBILE APP SPOOFING
* App Spoofing
—-
DETECT EXPOSED CODE, SENSITIVE DATA OR VULNERABILITIES
EXPOSED INFRASTRUCTURE
* Code Monitoring
* Bucket Monitoring
* Public IP's and passive Vulnerability Monitoring
* Paste & Git Monitoring
* Google Dork Monitoring
* URL Shortener Monitoring
EXPOSED EMPLOYEES
* E-Mail Monitoring
—-
FIND OUT IF SOMEONE TALKS ABOUT YOU IN THE DARKNET OR DEEPWEB
DEEP WEB AND DARKNET MENTIONING
* Hacker Forum Search - Surface Web
* Telegram Hacker Channel Search
* Discord Hacker Channel Search
* Live Search
* Social Media Search
—-
FIND OUT IF DATA HAS BEEN LEACKED
LEAK SEARCH IN EXPERT MODE
* Leak Search
* Create Bookmarks
CREDIT CARD SEARCH IN EXPERT MODE
* Credit Card Search
BOTNET SEARCH
* Bot Search
RANSOMWARE MONITORING
* Ransomware Site Monitoring
——–
COMPARE THE DATA
* Benchmarks
* Trends
——–
ALERTS
* Creating Alerts
* Splunk Integration
—-
ACCESS & EXPORT DATA
* Export to CSV, XML etc
* Create MS-Word based report (.Docx)
* API
—-
SETUP OPTIONS
* Asset Manager
—-
GENERAL TOPICS
* How do we find the data in Kaduu
* How to download complete leak files
* Can you search for more than one keyword at the same time
* Simple vs Expert Mode