We collect details related to the version number of your systems and software from internet-wide scanners like Censys, Shodan, Zoomeye etc.
These version numbers are converted into the corresponding common platform enumeration number (CPE-ID) and are correlated with NIST NVD and MITRE CVSS databases to detect and approximate any unmitigated known vulnerabilities.
We collect the contents of web applications from various Internet-wide scanners and analyze them for application-level weaknesses, such as Cross Site Request Forgery, Cross Content Mixing, and Plain Text Transmission of Sensitive Information.
The results are correlated with the MITRE CWE database to detect the severity level of each finding.
We generate a DNS health report from 40+ control items collected from online services like IntoDNS, Robtex, Netcraft, and HackerTarget.
Since DNS queries are recursive, it is almost impossible to detect hacker footprints from DNS servers.
We collect vulnerabilities related to potential email servers and SMTP misconfigurations like open relay, unauthenticated logins, restricted relay, and SMTP ‘Verify’ vulnerabilities from online services like MxToolbox and eMailSecurityGrader.
SSL/TLS configurations and vulnerabilities are provided by several third-party online services.
Black Kite results for this category come from various online SSL grading services, including Qualys SSL Labs scanner, HTBridge, and Mozilla Website Observatory.
There are more than five billion hacked emails/passwords available on the Internet and underground forums. Black Kite identifies the leaked or hacked emails and passwords.
An Asset reputation score is based on the number of IPs or domains that are blacklisted or used for sophisticated APT attacks. The reputation feeds are collected from VirusTotal, Cymon, Firehol, BlackList DNS servers, and more.
Hackers often publicize their targets or victims on social networking sites to motivate other hackers to attack the same target. The results for this category are filtered from billions of social media posts.
Hackers publicize their targets in underground forums or the dark web. Black Kite collects information from hundreds of dark forums, criminal sites and hacktivist sites, and filters the results for the corresponding company.
Fraudulent domains and subdomains are extracted from the domain registration database, which holds more than 300M records.
Fraudulent or pirate mobile or desktop applications are used to hack/phish employee or customer data. This category identifies possible fraudulent or pirate mobile/desktop apps on Google Play, App Store, and pirate app stores.
A digital footprint is determined by open ports, services, and application banners. This information is gathered from Black Kite crawlers, Censys, VirusTotal, Robtext, Alexa, Shodan, and others.
Company employees often inadvertently disclose local IPs, email addresses, version numbers, and Whois privacy records, and sometimes even misconfigure a service in a way that exposes sensitive information to the internet. Black Kite identifies these potential disclosures.
Attack surface is the technical analysis of open critical ports, out-of-date services, application weaknesses, SSL/TLS strength, and any misconfigurations.
This information is gathered from Censys and Shodan databases and service/application versions are correlated with Passive Vulnerability Scan results.
Brand monitoring is a business analytics process that monitors various channels on the web or media to gain insight about the company, brand, and anything explicitly connected to cyberspace.
This section analyzes network-level problems and detects any critical ports, unprotected network devices, misconfigured firewalls, and service endpoints.
This section shows the result of 15 different potential DDoS checks and detects any potential DDoS amplification endpoints. The data is collected from non-intrusive scanners and internet-wide scanners.
Cisco, Alexa and Majestic track web sites and rank them according to popularity, backlinks, and references. This subcategory shows Alexa and Majestic trends, Google Page insight speed test results, and Web Content Accessibility Guidelines (WCAG) 2.0 parsing compliance findings.
Companies use content delivery networks (CDNs) — large distributed systems of servers deployed in multiple data centers across the Internet — for online libraries like JQuery.
Black Kite analyzes the CDN content to detect possible vulnerabilities.
This is a special analysis of a company’s main website. We collect findings related to your SSL/TLS strength, patch management, application security, web ranking and brand monitoring.