In CryEye, users can add various assets to their workspaces. These assets can be:
Scanned by the audit system to detect vulnerabilities, misconfigurations, and data leaks.
Monitored for Uptime to track availability.
Included in audit projects (single/multi-target or whitebox to analyze source code for development-stage risks.
Assets in CryEye are categorized as follows:
Web
- For scanning web resources to detect vulnerabilities or data leaks.
Infrastructure
- For analyzing infrastructure files for vulnerabilities and misconfigurations.
Mobile
- For inspecting mobile app files to uncover security flaws, misconfigurations, or incorrect permissions.
Source Code Analysis
- For scanning GitHub repositories and source code to detect vulnerabilities, hardcoded secrets, emails, usernames, and passwords.
Binary Analysis
- For analyzing binary code to understand behavior and uncover potential security risks.
Recon
- For scanning personal data (emails, usernames, phone numbers) for exposure or leaks.
Network Forensics
- For analyzing network traffic to investigate incidents, detect intrusions, and collect legal evidence.
Names, Titles or Identifications
- For OSINT and identity-related reconnaissance.
Other
- For assets that do not fit into any specific category.
In the Asset Dashboard, click the Add Assets button. Then select the icon for the asset type you want to add and fill in the required details.
You can:
Alternatively, users can create different projects later from the Asset Dashboard using the Configure workflow.
In URL Asset
users can enter and scan website URL. For example: https://example.com
In Domain Asset
users can enter and scan website Domain name. For example: example.com
In Host Asset
users can enter and scan website Host name (domain or IP) & Host port. For example: example.com:8000
or 192.168.0.1:8000
In IPv4 Asset
users can enter and scan website IPv4 address. For example: 192.168.0.1
In IPv6 Asset
users can enter and scan website IPv6 address. For example: 2001:0db8:85a3:0000:0000:8a2e:0370:7334
In Docker Image Asset
users can upload txt file with Docker image name scan Docker image, used for creating Docker Container. For example: docker-compose.yml
In Docker File Asset
users can Upload and scan Docker File, Dockerfile used for build Docker image. For example: https://github.com/docker-library/tomcat/blob/9cad4b1a880782d3504d7c8723fccc667965cf29/8.5/jdk8/temurin-focal/Dockerfile
In Teraform Asset
users can upload and scan Infrastructure files for Terraform vulnerabilities and misconfigurations. For example: Teraform.zip
In AWS Cloudformation Asset
users can upload and scan Infrastructure files for AWS Cloudformation vulnerabilities and misconfigurations. For example: AWS.zip
In Ansible Asset
users can upload and scan Infrastructure files for AWS Cloudformation vulnerabilities and misconfigurations. For example: Ansible.zip
In Helm Asset
users can upload and scan Infrastructure files for Helm vulnerabilities and misconfigurations. For example: Helm.zip
In Kubernetes Asset
users can upload and scan Infrastructure files for Kubernetes vulnerabilities and misconfigurations. For example: Kubernetes.zip
In Azure resource manager Asset
users can upload and scan Infrastructure files for Azure vulnerabilities and misconfigurations. For example: ARM.zip
In Android Application Asset
users can upload and scan Android APK files for Mobile vulnerabilities, misconfigurations and wrong permissions. For example: Application.apk
In Apple Application Asset
users can upload and scan Apple IPA files for Mobile vulnerabilities, misconfigurations and wrong permissions. For example: Application.ipa
In Git Repository
asset users can add GitHub repositories for scan to find vulnerabilities, hardcoded misconfigurations, emails, usernames, passwords. For example: https://github.com/nmap/nmap
In Sources
asset users can add source code archive with application source code. for scan to find vulnerabilities, hardcoded misconfigurations, emails, usernames, passwords.
In File
asset users can add any file for analyzing and understanding the behavior and vulnerabilities of binary code to identify and mitigate potential security risks.
The Cloud URL
asset allows users to provide a URL for a cloud asset located with a cloud provider. For example: https://xxx.digitaloceanspaces.com
The Cloud Name asset allows users to provide a name for a cloud asset located with a cloud provider. For example: somename
or some-name
In Email
asset users can enter and scan electronic mail address for information leaks and breaches. For example: [email protected]
In Phone
asset users can enter and scan phone numbers for information leaks. For example: +1234567890
In Username
asset users can enter and scan Usernames for information leaks and breaches. For example: username_123
In Packet Capture
asset users can upload Packet capture file with extentions .pcap, .cap, .dmp
for analysis, and interpretation of network traffic data.
In Technology
asset users can add technology for scaning to find a vulnerabilities, exploits, PoCs. For example: Django 3.0
In CPE
asset users can add technology in CPE 2.3 format for scaning to find a vulnerabilities, exploits, PoCs.
In Organization
asset users can add name of organization, company or groupe for information gathering, OSINT. For example: Google
In Bank number
asset users can add IBAN or credit card number for check leaked information.
The Text Line
asset is for general use, allowing users to input a text string or a single word for various purposes.
In Keyword
asset user can add a keyword to search for similar domain names and url addresses and check them for phishing.
In Smart contract
asset users can Upload and scan Self-executing smart contract files for different blockchains.
In NuGet Package
asset users can add archive file with some NuGet packegas for vulnerability scan.
In the Built Angular Application
asset, users can add a Zip archive with a built Angular application (JavaScript files) for vulnerability scanning.
In Regex
asset users can add regular expression for darknet monitoring triggers.
In Custom
asset users can enter or upload anything else that is not listed here.