What the Darkscan service includes
It involves gathering and examining information to identify and define potential cyber threats in technical terms, considering specific operational contexts.
The Darkscan operation is carried out through a process of research, identification and choice of publicly accessible information regarding the domain of interest, in the Deep and Dark Web.
Threat Intelligence
Darkscan is a predictive activity, it has the aim and objective of identifying any public information available at the level OSINT e CLOSINT related to a particular target.
OSINT, which stands for Open Source Intelligence, refers to the process of gathering information by consulting publicly available sources, also known as “open sources”.
Acronym for Close Source Intelligence, process of gathering information through consultation of "closed sources", not accessible to the public or "restricted" areas.
Why Darkscan?
Darkscan is intended to better inform high-level decisions made by an organization's managers and other decision makers, as such, the content is generally less technical and is presented via reports or briefings. Helping defenders understand, in specific terms, how their organization might be attacked and the best ways to defend against or mitigate such attacks.
STRATEGIC
The most specialized and informative software for non-technical audiences.
TACTICAL
It describes the tactics, techniques and procedures of Criminal Hackers often aimed at a more specialized audience.
OPERATIONAL
Provides specific details about a criminal hacking campaign.
Darkscan has the aim and objective of looking at the security of a company with the eyes of a hacker and focusing on any public information of a domain, through the study of the reference target from all points of view.
Specifications
Data Breach Detected and Emails Compromised.
Depending on the case, it is possible to provide:
- Email and password hacked
- System Addresses
- Addresses of Co-Hosted Systems
- Incorrect SSL certificates
- Pages with Login
- Pages with Uploads
- Data Leaks Passed
- Source code repository
- Public Domain Vulnerabilities