DARWIS On-prem
Powerful security solution for API-based applications
Ensures protection from cyber threats and attacks
Critical for modern software development and organizational functioning
Key Features
Secure REST API Endpoints
- Blocks malicious requests
- Enforces Open API 3.0 specification
Stop API Data Breaches
- Blocks malformed API responses
- Prevents sensitive data exposure
Discover Shadow APIs
- Identifies undocumented API endpoints
- Enhances API visibility
How API Firewall Works
Operates as Intermediary
Inspects real-time API requests and responses Customizable security policies
Running Modes
Blocking Mode
- Blocks non-compliant requests
- Stops malicious traffic
Monitoring Mode
- Discovers Shadow APIs
- Logs malformed requests and responses
Conclusion
API Firewall ensures
- API integrity
- Sensitive data protection
- Application availability
SHIELDSUP Comprehensive Security Solutions
Web Application Security
Identifies common web vulnerabilities with community-powered templates.
Web Server Assessment
Identifies common vulnerabilities and misconfigurations in web servers.
Infrastructure Security
Audits server configurations, open ports, and insecure services for security issues.
CMS Platform Security
Identifies vulnerabilities specific to CMS platforms like WordPress, Joomla, or Drupal.
API Security Testing (alpha)
Tests APIs against known vulnerabilities and misconfigurations.
Database Security Assessment
Scans databases for known vulnerabilities, default configurations, and access control issues.
Secure Development
Use as part of development process to identify and mitigate vulnerabilities at initial stages.
Customized Exploits
Allows addition of private exploits for finding IDOR, LFI by expert bounty hunters.
Third-party Vendor Assessment
Evaluates the security of third-party vendors by scanning their digital assets.
Unlimited Scans
Perform scans without limitations.
Cloud Environment Security
Scans cloud environments for misconfigurations and vulnerabilities.
Bug Tracking
Adds important vulnerabilities to a bug tracking sheet for follow-up.
State-level Actor Detection
Import vulnerabilities used by state-level actors (as defined in ShieldsUp).
Network Device Security(alpha)
Identifies vulnerabilities in network devices like routers, switches, and firewalls
Future Integration with OpenAI
Plan to integrate with OpenAI system for defining new vulnerabilities and writing security scanner plugins.
What is Honeypot
A honeypot is a decoy system or network designed to attract cyber attackers, allowing security professionals to detect, analyze, and understand their tactics, thereby enhancing overall cybersecurity measures and defenses.
Malware honeypot
Capturing Malware
Listens on multiple ports (21, 80, 443, 445) to capture various types of malware; Stores captured malware samples in a folder for analysis.
Panel is provided
It Provides tools for monitoring and analyzing captured malware trends.
Analyze
collect malware and send to Darwis threat intel for analysis. We can find known virus, unknown virus in the panel
All captured malware will be checked using WS4 Malware lookup/analysis API.
DARWIS
TPOT
DARWIS TPOT is an enhanced version of the TPOT honeypot platform
Features improved security, comprehensive dashboards, and integrated threat intelligence.
Captures, analyzes, and reports on malicious activities targeting the network.
Monitors network activity; Integrates with WS4 Malware Lookup/analysis API.
Captures, analyzes, and reports on malicious activities targeting the network.
Monitors network activity; Integrates with WS4 Malware Lookup/analysis API.
Removed wordpress so that attacker won’t use our own honeypot to attack our infrastructure
Integrated to Darwis threat intel for analysis
customised panel showing top 1000 malware ip, protocol attack IP
Integrated malware honeypot with panel showing known viruses, new viruses.
Multi-Honeypot Platform
Supports over 20 honeypots (e.g., Cowrie, Dionaea, Glutton).
Elastic Stack Integration: Uses Elasticsearch,Logstash, and Kibana.
Enhanced Visualization Tools: Animated attack maps and detailed dashboards.