Hive Platform Guide¶
Welcome to the comprehensive Hive Platform documentation. This guide covers everything you need to know about using the web-based Hive platform.
What is the Hive Platform?¶
The Hive Platform is a web-based attack surface management and penetration testing platform that provides:
- Centralized Asset Management: Track and visualize your entire digital attack surface
- Automated Security Testing: Execute comprehensive security scans with pre-built runbooks
- Intelligence Analysis: Analyze vulnerabilities and findings with advanced reporting
- Team Collaboration: Work together with role-based access control
- Campaign Management: Organize multiple engagements and clients
Platform Overview¶
📊 Dashboard
Real-time overview of your security posture with key metrics and activity feeds.
🗂️ Asset Management
Comprehensive inventory of URLs, hosts, IPs, ports, DNS, applications, and metadata.
⚔️ Attack Platform
Create and execute security testing strategies with runbooks and attack trees.
🤖 Automation Engine
Schedule, execute, and monitor security scans with powerful automation.
Getting Started with Hive Platform¶
For First-Time Users¶
- Installation & Setup - Get access and configure your account
- Dashboard Overview - Understand the main interface
- Create Your First Scan - Run a security test
For Regular Users¶
- Asset Management - Manage your attack surface
- Creating Runbooks - Build custom testing workflows
- Analyzing Results - Review and prioritize findings
For Advanced Users¶
- Attack Trees - Complex multi-stage scenarios
- Automation - Schedule recurring scans
- Reporting Engine - Custom report generation
Key Features¶
Asset Discovery & Management¶
Automatically discover and track:
- Web Assets: URLs, sites, web applications
- Network Assets: Hosts, IP addresses, ports
- Infrastructure: DNS records, certificates, services
- Applications: Detected software and versions
- Metadata: Headers, banners, configurations
Learn more: Asset Management Guide
Security Testing¶
Execute comprehensive security tests:
- Runbooks: Pre-configured testing workflows
- Attack Trees: Multi-stage attack scenarios
- Module Library: 30+ integrated security tools
- Custom Modules: Extend with your own tools
Learn more: Attack Platform Guide
Intelligence & Reporting¶
Transform data into actionable intelligence:
- Vulnerability Management: Track and prioritize security issues
- Finding Analysis: Detailed security observations
- Risk Assessment: CVSS scoring and impact analysis
- Professional Reports: Executive and technical reporting
Learn more: Intelligence Guide
Collaboration & Management¶
Work effectively as a team:
- Multi-User Support: Invite team members
- Role-Based Access: Control permissions
- Campaign Management: Organize client work
- Engagement Tracking: Monitor testing progress
Learn more: Operations Guide
Navigation Guide¶
Main Navigation Sections¶
The Hive platform is organized into logical sections:
Assets¶
- All Assets: Complete inventory
- By Type: URLs, Sites, Hosts, Ports, IPs, DNS, Applications, Metadata
- Graph Viewer: Visual relationship mapping
Attack Platform¶
- Runbooks: Pre-configured testing workflows
- Attack Trees: Complex attack scenarios
- Strategy Builder: Create custom strategies
Automation Engine¶
- Scan Executions: Active and completed scans
- Scan History: Historical scan data
- Module Sources: Available security tools
Operations¶
- Campaigns: High-level initiatives
- Engagements: Specific testing activities
- Organizations: Client management
Intelligence¶
- Vulnerabilities: Security weaknesses
- Findings: Security observations
- Reports: Generated documentation
- Reporting Engine: Custom report builder
Configuration¶
- Users: Team member management
- Groups: Access control groups
- Settings: Platform configuration
- API Keys: Authentication tokens
Common Workflows¶
Workflow 1: External Web Application Test¶
graph LR
A[Create Engagement] --> B[Select Runbook]
B --> C[Configure Target]
C --> D[Execute Scan]
D --> E[Review Assets]
E --> F[Analyze Findings]
F --> G[Generate Report]
Duration: 30-60 minutes
Guide: Web Application Testing
Workflow 2: Continuous Monitoring¶
graph LR
A[Define Scope] --> B[Create Attack Tree]
B --> C[Schedule Recurring]
C --> D[Auto-Execute]
D --> E[Alert on Changes]
E --> F[Review Trends]
Duration: Initial setup 1 hour, then automated
Guide: Continuous Monitoring
Workflow 3: Red Team Operation¶
graph LR
A[Reconnaissance] --> B[Asset Discovery]
B --> C[Vulnerability Scan]
C --> D[Exploitation]
D --> E[Post-Exploitation]
E --> F[Reporting]
Duration: Days to weeks
Guide: Red Team Operations
Platform Capabilities¶
What You Can Do¶
✅ Discover: Automatically find assets across your attack surface
✅ Scan: Execute comprehensive security testing
✅ Analyze: Identify vulnerabilities and security issues
✅ Visualize: Map relationships between assets
✅ Report: Generate professional documentation
✅ Collaborate: Work with your team
✅ Automate: Schedule recurring scans
✅ Integrate: Connect via API
What's Coming Soon¶
🔜 AI-Powered Analysis: Automated finding correlation
🔜 Advanced Reporting: Custom report templates
🔜 Threat Intelligence: External threat data integration
🔜 Compliance Frameworks: Pre-built compliance testing
🔜 Mobile App: iOS and Android applications
Best Practices¶
Security Testing¶
- Always Get Authorization: Never test without permission
- Define Clear Scope: Know what's in and out of scope
- Start Broad, Go Deep: Begin with reconnaissance, then focus
- Document Everything: Record all findings and evidence
- Validate Results: Confirm findings before reporting
Asset Management¶
- Regular Discovery: Run scans frequently to find new assets
- Tag Consistently: Use standardized tagging
- Review Relationships: Understand asset connections
- Track Changes: Monitor for new or modified assets
- Clean Up: Remove decommissioned assets
Collaboration¶
- Use Engagements: Organize work into engagements
- Share Runbooks: Create reusable testing strategies
- Document Findings: Add context and evidence
- Communicate: Keep stakeholders informed
- Review Together: Peer review important findings
Support & Resources¶
Getting Help¶
- 📖 Documentation: You're reading it!
- 💬 Community Forums: Connect with other users
- 📧 Email Support: support@darksidesecurity.io
- 🎓 Video Tutorials: Visual learning resources
- 📞 Enterprise Support: Dedicated support for enterprise customers
Additional Resources¶
- API Documentation - Integrate programmatically
- APHIDS CLI Guide - Command-line interface
- Workflow Examples - Real-world scenarios
- FAQ - Common questions
Quick Links¶
| Task | Link |
|---|---|
| Run your first scan | Getting Started |
| Create a runbook | Creating Runbooks |
| View discovered assets | Asset Inventory |
| Analyze vulnerabilities | Vulnerabilities |
| Generate a report | Reporting Engine |
| Manage team members | Users |
| Configure API access | API Keys |
🚀 Ready to Dive In?
Choose a section above to start exploring the Hive Platform!