Skip to content

Hive Platform Guide

Welcome to the comprehensive Hive Platform documentation. This guide covers everything you need to know about using the web-based Hive platform.

What is the Hive Platform?

The Hive Platform is a web-based attack surface management and penetration testing platform that provides:

  • Centralized Asset Management: Track and visualize your entire digital attack surface
  • Automated Security Testing: Execute comprehensive security scans with pre-built runbooks
  • Intelligence Analysis: Analyze vulnerabilities and findings with advanced reporting
  • Team Collaboration: Work together with role-based access control
  • Campaign Management: Organize multiple engagements and clients

Platform Overview

📊 Dashboard

Real-time overview of your security posture with key metrics and activity feeds.

Learn More →

🗂️ Asset Management

Comprehensive inventory of URLs, hosts, IPs, ports, DNS, applications, and metadata.

Learn More →

⚔️ Attack Platform

Create and execute security testing strategies with runbooks and attack trees.

Learn More →

🤖 Automation Engine

Schedule, execute, and monitor security scans with powerful automation.

Learn More →

📋 Operations

Manage campaigns, engagements, and organizations for structured testing.

Learn More →

🔍 Intelligence

Analyze vulnerabilities, findings, and generate professional reports.

Learn More →

Getting Started with Hive Platform

For First-Time Users

  1. Installation & Setup - Get access and configure your account
  2. Dashboard Overview - Understand the main interface
  3. Create Your First Scan - Run a security test

For Regular Users

  1. Asset Management - Manage your attack surface
  2. Creating Runbooks - Build custom testing workflows
  3. Analyzing Results - Review and prioritize findings

For Advanced Users

  1. Attack Trees - Complex multi-stage scenarios
  2. Automation - Schedule recurring scans
  3. Reporting Engine - Custom report generation

Key Features

Asset Discovery & Management

Automatically discover and track:

  • Web Assets: URLs, sites, web applications
  • Network Assets: Hosts, IP addresses, ports
  • Infrastructure: DNS records, certificates, services
  • Applications: Detected software and versions
  • Metadata: Headers, banners, configurations

Learn more: Asset Management Guide

Security Testing

Execute comprehensive security tests:

  • Runbooks: Pre-configured testing workflows
  • Attack Trees: Multi-stage attack scenarios
  • Module Library: 30+ integrated security tools
  • Custom Modules: Extend with your own tools

Learn more: Attack Platform Guide

Intelligence & Reporting

Transform data into actionable intelligence:

  • Vulnerability Management: Track and prioritize security issues
  • Finding Analysis: Detailed security observations
  • Risk Assessment: CVSS scoring and impact analysis
  • Professional Reports: Executive and technical reporting

Learn more: Intelligence Guide

Collaboration & Management

Work effectively as a team:

  • Multi-User Support: Invite team members
  • Role-Based Access: Control permissions
  • Campaign Management: Organize client work
  • Engagement Tracking: Monitor testing progress

Learn more: Operations Guide

The Hive platform is organized into logical sections:

Assets

  • All Assets: Complete inventory
  • By Type: URLs, Sites, Hosts, Ports, IPs, DNS, Applications, Metadata
  • Graph Viewer: Visual relationship mapping

Attack Platform

  • Runbooks: Pre-configured testing workflows
  • Attack Trees: Complex attack scenarios
  • Strategy Builder: Create custom strategies

Automation Engine

  • Scan Executions: Active and completed scans
  • Scan History: Historical scan data
  • Module Sources: Available security tools

Operations

  • Campaigns: High-level initiatives
  • Engagements: Specific testing activities
  • Organizations: Client management

Intelligence

  • Vulnerabilities: Security weaknesses
  • Findings: Security observations
  • Reports: Generated documentation
  • Reporting Engine: Custom report builder

Configuration

  • Users: Team member management
  • Groups: Access control groups
  • Settings: Platform configuration
  • API Keys: Authentication tokens

Common Workflows

Workflow 1: External Web Application Test

graph LR
    A[Create Engagement] --> B[Select Runbook]
    B --> C[Configure Target]
    C --> D[Execute Scan]
    D --> E[Review Assets]
    E --> F[Analyze Findings]
    F --> G[Generate Report]

Duration: 30-60 minutes
Guide: Web Application Testing

Workflow 2: Continuous Monitoring

graph LR
    A[Define Scope] --> B[Create Attack Tree]
    B --> C[Schedule Recurring]
    C --> D[Auto-Execute]
    D --> E[Alert on Changes]
    E --> F[Review Trends]

Duration: Initial setup 1 hour, then automated
Guide: Continuous Monitoring

Workflow 3: Red Team Operation

graph LR
    A[Reconnaissance] --> B[Asset Discovery]
    B --> C[Vulnerability Scan]
    C --> D[Exploitation]
    D --> E[Post-Exploitation]
    E --> F[Reporting]

Duration: Days to weeks
Guide: Red Team Operations

Platform Capabilities

What You Can Do

Discover: Automatically find assets across your attack surface
Scan: Execute comprehensive security testing
Analyze: Identify vulnerabilities and security issues
Visualize: Map relationships between assets
Report: Generate professional documentation
Collaborate: Work with your team
Automate: Schedule recurring scans
Integrate: Connect via API

What's Coming Soon

🔜 AI-Powered Analysis: Automated finding correlation
🔜 Advanced Reporting: Custom report templates
🔜 Threat Intelligence: External threat data integration
🔜 Compliance Frameworks: Pre-built compliance testing
🔜 Mobile App: iOS and Android applications

Best Practices

Security Testing

  1. Always Get Authorization: Never test without permission
  2. Define Clear Scope: Know what's in and out of scope
  3. Start Broad, Go Deep: Begin with reconnaissance, then focus
  4. Document Everything: Record all findings and evidence
  5. Validate Results: Confirm findings before reporting

Asset Management

  1. Regular Discovery: Run scans frequently to find new assets
  2. Tag Consistently: Use standardized tagging
  3. Review Relationships: Understand asset connections
  4. Track Changes: Monitor for new or modified assets
  5. Clean Up: Remove decommissioned assets

Collaboration

  1. Use Engagements: Organize work into engagements
  2. Share Runbooks: Create reusable testing strategies
  3. Document Findings: Add context and evidence
  4. Communicate: Keep stakeholders informed
  5. Review Together: Peer review important findings

Support & Resources

Getting Help

  • 📖 Documentation: You're reading it!
  • 💬 Community Forums: Connect with other users
  • 📧 Email Support: support@darksidesecurity.io
  • 🎓 Video Tutorials: Visual learning resources
  • 📞 Enterprise Support: Dedicated support for enterprise customers

Additional Resources

Task Link
Run your first scan Getting Started
Create a runbook Creating Runbooks
View discovered assets Asset Inventory
Analyze vulnerabilities Vulnerabilities
Generate a report Reporting Engine
Manage team members Users
Configure API access API Keys

🚀 Ready to Dive In?

Choose a section above to start exploring the Hive Platform!