-
Notifications
You must be signed in to change notification settings - Fork 26
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Active Digital System Discovery #192
Comments
Apologies this fell to the back-burner, we've been trying to keep up with pull requests. The description & references appear to focus on discovering Web Servers. My inclination is to narrow this technique to Active Server Discovery as a type of Network Node Inventory.( A Digital System might comprise many servers for example) |
@netfl0 No worries, I had on my list of things to do to create a PR for this and I also have not gotten around to it (thanks for the reminder). The gist of this was related to Attack Surface Management, which could involve scanning a cluster of digital systems that comprise a single web application, for example if on page load an application calls server/domain/subdomain "A" for page content and server/domain/subdomain "B" for authentication, both of those things should be discovered during scanning and used as input for attack surface inventorying. Alternatively, to your point, those web-accessible endpoints (domains, API endpoints, etc) could be considered network nodes depending on the context. Either way works. The goal is just to have a technique related to actively scanning an attack surface to monitor newly exposed resources, which can then be used to improve asset inventories, dependency maps, etc. The "Active" keyword meaning it should be doing this continuously, not just once a month for example. |
For contrib: |
Hey Connor, thanks for your comments so far. I think we'd like to proceed with including this technique as a type of Network Node Inventory and the name "Active Server Directory". I agree we should emphasize this as a continous process. I noticed that someone had made a PR on this issue already #274. Are you guys connected? |
Note: all sections are required.
Active Digital System Discovery
OR Public Digital System Discovery
Digital Artifacts
MAPS -> Digital System
MAPS -> Digital Artifact
EVALUATES -> Application
Definition
Discovery and identification of internet-facing systems systems and applications in an automated manner. Active scanning includes interaction with the system or application to gather more data about them.
How it works
Active Digital System Discovery entails the systematic import or consistent scanning of network segments and domains to identify orphaned, incorrectly inventoried, or otherwise unknown systems or applications. Active Digital System Discovery can be performed by tracing referenced systems in application code, directory fuzzing, forced browsing, or other enumeration techniques.
Output from this technique can be used to enrich asset inventories, dependency maps, vulnerability management efforts and other related D3FEND Techniques.
Considerations
References
https://www.cisa.gov/news-events/news/cyber-hygiene-web-application-scanning
https://www.praetorian.com/blog/content-discovery-understanding-your-web-attack-surface/
The text was updated successfully, but these errors were encountered: