Platform Application and Endpoint Data

Censys uses sophisticated scanners to identify specific applications and non-root endpoints present on web assets. This document explains how to find and use application and non-root endpoint data.

Application data

Censys uses specialized scanners that identify details about services that run on top of HTTP. They go beyond a basic HTTP scan, offering richer detail about specific services. The information obtained from these scans is available in named data objects and fields for host service and web property endpoints.

Application-specific data is only available to customers on the Platform Enterprise plan. Industrial control system (ICS) application data is only available to customers with access to ICS protocols.

The data obtained from these scans allow you to:

  • Enumerate high-risk services exposed to the public internet.
  • Collect detailed application metadata, providing deeper visibility than basic banner grabs.
  • Inform SOC, IR, and threat intel teams about exposures that adversaries actively seek and exploit.

The following table lists some of the application-specific scanners that Censys uses and the data objects or field paths used for recording their information. Where available, the application name links to the section of the web property Data Definitions table in the Platform web console that lists all of the data fields available for the application. Note that endpoint data is also available on hosts.

ApplicationDescription
Chrome DevToolsRemote debugging interfaces.
Cobalt StrikeC2 and threat emulation framework.
ElasticsearchSearch and indexing engine.
FortiGatePerimeter firewall device.
GraphQLAPI query language.
Ivanti AvalancheDevice and endpoint management.
KubernetesContainer orchestration.
OllamaAI and machine learning tooling.
Plex Media ServerMedia devices.
PprofGo profiling interface.
PrometheusMonitoring and metrics system.
Prometheus TargetDiscovered service endpoints.
Red Lion WebHuman-machine interfaces and other devices.
Scada_ViewSoftware used for industrial automation.

The next two sections walk through how to use application data in real-world scenarios.

Cobalt Strike application data

Cobalt Strike is a penetration testing tool. However, it is commonly abused by threat actors for post-exploitation and command-and-control (C2) operations. Detecting exposed Cobalt Strike servers helps identify compromised environments or adversary-controlled infrastructure before widespread exploitation.

This section explains how you can use application data from Censys to protect your organization using an example web property record that Cobalt Strike was detected on.

Cobalt Strike was detected on the web property record shown above. You can incorporate this IP into your blocklist or cross-reference it with egress traffic in your SIEM to determine whether there were any communications between your devices and this IP. You can monitor your network for any beacons by looking for periodic HTTP requests to 45.192.104.206 over port 6003.

Additional application details for Cobalt Strike on the example web property record.

You can use the following application-specific data for further investigation. Most of this information is shown on the endpoint preview card. All scan data is available in the raw data output on the web property.

  • The URIs /activity, /ga.js, and /submit.php. In the Cobalt Strike data object, these values are contained in the http_get.uri field.

  • The user agent values Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.0; Trident/5.0; BOIE9;ENUS) and Mozilla/5.0 (compatible; MSIE 9.0; Windows NT 6.1; Trident/5.0; BOIE9;ENIN). This information is located in the user_agent field for the Cobalt Strike endpoint.

  • The sleep_timevalue of 60 seconds.

  • The absence of SSL. In the raw data output for this endpoint, the value forssl is false.

  • You can use additional details like the watermark value to determine whether this Cobalt Strike service is being used for red team testing or malicious purposes. Additionally, you can create a collection to track resources that use the same watermark for continuous monitoring and alerting.

The data provided by the Cobalt Strike scanner in this example is much richer than a standard HTTP scanner. For example, contrast the Cobalt Strike scan data with the data obtained from an HTTP scan in the Platform. The data from the HTTP scanner is significantly less actionable than the data from the app scanner.

FortiGate application data

FortiGate firewalls are widely used for perimeter defense. If exposed, they can reveal, VPN access points, administrative panels, and security policy misconfigurations. Attackers actively scan for exposed FortiGate VPN endpoints due to known vulnerabilities (such as CVE-2022-42475) that allow remote code execution.

This section explains how you can use application data from Censys to protect your organization using an example web property record that FortiGate was detected on.

You can use the following application-specific data for further investigation. Most of this information is shown on the endpoint preview card. All scan data is available in the raw data output on the web property.

  • This FortiGate instance is running version 7.2.3 (web.endpoints.fortigate.version in the raw data) and is mapped to multiple CVEs.
  • The TLS certificate is self-signed by Fortinet and is not trusted by major browsers (validation failed for NSS, Microsoft, Apple, Chrome).
  • The Strict-Transport-Security HTTP header is is present but missing includeSubDomains (recorded in web.endpoints.banner). Additionally, the max-age is less than one year. You could flag this for your team to harden response headers.
  • Based on known firewall standards (NIST, ISO 27001), externally accessible firewall UIs are non-compliant.
  • Given the existence of several critical and high CVEs associated with this FortiGate version, it is worthwhile to upgrade to the latest version.

Endpoint data

Extensive data about exposed endpoint paths beyond the root / are available in the Platform datasets. In the Platform data schema, this information is available in the host.services.endpoints.path and web.endpoints.path fields. Examples of deeper endpoint paths include /webpages/login.html, /sonicui/7/login/, /admin/login.asp, and so on. This data allows you to uncover detailed information about web applications beyond the ones that Censys has named scanners and data objects for.

Use a report for hosts or web properties broken down by the path field to see example values that are useful for your investigations.