Introductory Use Cases

The datasets available in Legacy Search support security practitioners in their efforts to make Internet-facing systems—and the Internet in general—more secure and safe.

👍

Tip

Use CensysGPT to leverage the natural-language processing of ChatGPT to produce valid query syntax in the Censys Search Language for use in the Legacy Search product. Support for CenQL and the Censys Platform is forthcoming.

Key use cases

  • Investigate indicators of compromise (IoCs): Find and track threat actors on the internet via the infrastructure they set up.
  • Enrich internal threat feeds with host and certificate data: Augment network logs with the most accurate, up-to-date public profile of the entities within and connecting to your network.
  • Create a timeline of adversary infrastructure: Investigate how and when an adversary weaponized infrastructure. See the history of a compromised or suspicious host.
  • Understand the global impact of vulnerabilities across the Internet: Conduct security research to understand the global impact of vulnerabilities across the Internet from CVEs to zero-days like SolarWinds or Microsoft Exchange.
  • Map your external attack surface: Investigate and view your attack surface from an external perspective by finding your Internet-facing assets and evaluating them for vulnerabilities.

Investigate indicators of compromise

The rich, highly indexed datasets available in Legacy Search allow you to find the needles in the haystacks when you’re threat hunting. With Legacy Search, you can take threat intelligence from internal or public sources to build, validate, and investigate IoCs on hosts across the Internet.

Understanding the Censys host fields where the indicators are located is essential for finding them.

Examples

In the Censys Search web UI:

  • Ask a question like, "Which hosts are serving reused/reusable malicious content?"
    • Query for fingerprints using hashes: services.http.response.body_hash: {SHA1-hash of a site serving malicious content}
  • Ask a question like, "Which hosts that I tagged have another characteristic I’m interested in?"
    • Search within your tags: tags: {my-tag-name, my-other-tag-name} and services.service_name: DNS

Advanced technique

Enrich internal threat feeds with Censys host and certificate data

As you monitor network activity, you can look up IPs that your hosts are connecting to or receiving connections from. The Legacy Search view host API endpoint is fast and performant, so you can immediately enrich your network security logs with host profiles from Censys.

Example

You can use the API to retrieve host profiles programmatically.

  • Ask a question like, "What does this host that’s connecting to my network look like from an external perspective?"
    • Use the API to GET https://search.censys.io/api/v2/hosts/{ip-address}
      • Parse the host’s location data to look for geographic irregularities
      • Check for non-standard protocol/port pairs in the service info
      • Look for suspicious certificates (self-signed, issued by Let’s Encrypt, or containing suspicious names)
      • Check the DNS names resolving to the host

Advanced technique

Layer Legacy Search host profiles with Greynoise analysis and IP reputation data to help determine whether a host is suspicious.

Create a timeline of adversary infrastructure

See how a host has changed over time. Observe how services appeared, disappeared, or how new certificates were presented to chart how this infrastructure was weaponized.

Example

  • Ask the question, "What changes have been observed on this host in the past?"
    • On every host details page, the History tab lists reverse-chronologically ordered host events.

      You can browse events, select two points in time to calculate a diff or go back in time to view a host as it was recorded in Censys datasets then.

Advanced technique

  • Ask questions like, "What are the differences between two different hosts?"
    • To generate diffs, use the host diff API call, which offers greater flexibility than the UI.

Understand the global impact of vulnerabilities across the Internet

Search the entire Internet for hosts vulnerable to a new or existing vulnerability. Common Platform Enumeration (CPE) formatted software fields are available in Censys datasets and can be used in tandem with the Common Vulnerability Enumeration (CVE) framework. Leverage CVE Context on Censys Search for deeper and more efficient queries.

Example

In the Legacy Search web interface:

  • Ask a question like, "Which hosts are running a software version that I know is vulnerable to a particular vulnerability?"

Advanced technique

Upgrade to a Pro account to use regular expressions for even more fine-grained searching.

Map your external attack surface

Look at your organization’s Internet presence from the outside. Profile hosts, services, and certificates to assess your overall security posture and make improvements. Reduce public exposure, patch outdated or vulnerable systems, and practice good hygiene with Internet assets.

Examples

In the Legacy Search UI:

  • Ask a question like, "What other entities are connected to this one?"
    • On the Host Summary pages, click the Explore tab to use the visual explorer to find related certificates, names, and hosts.

  • Ask a question like, "Which hosts within my organization’s registered netblocks are online or have this characteristic?"
    • Search for and within CIDR blocks assigned to your organization: ip: X.X.X.X/# and …
  • See an example search within a CIDR.

Advanced technique

Check out the [Censys Attack Surface Management tool](https://censys.com/attack-surface-management/, which helps you shrink your attackable network surface area with best-in-class asset discovery, comprehensive inventory, risk analysis, and a cloud security offering tailored for cloud-based organizations.

Next steps

Now that you understand what you can accomplish with Legacy Search, learn how to write queries using the Censys Search Language.