Intelligence¶
Analyze vulnerabilities, findings, and generate professional security reports.
Overview¶
The Intelligence section transforms raw scan data into actionable security intelligence:
- Vulnerabilities: Security weaknesses and issues
- Findings: Security observations and notes
- Reports: Professional documentation
- Reporting Engine: Custom report generation
Vulnerabilities¶
What are Vulnerabilities?¶
Vulnerabilities are security weaknesses discovered during testing.
Vulnerability Information: - Title: Descriptive name - Severity: Critical/High/Medium/Low/Info - CVSS Score: Standardized severity (0-10) - Description: What the vulnerability is - Impact: Potential consequences - Affected Assets: Where it was found - Evidence: Proof of vulnerability - Remediation: How to fix it - References: CVE, CWE, external links
Severity Levels: - Critical (9.0-10.0): Immediate action required - High (7.0-8.9): High priority fix - Medium (4.0-6.9): Should be addressed - Low (0.1-3.9): Minor issue - Info (0.0): Informational only
Viewing Vulnerabilities¶
Access Vulnerabilities: 1. Navigate to Intelligence → Vulnerabilities 2. View all discovered vulnerabilities 3. Filter and sort as needed
Filters Available: - Severity level - Engagement - Asset type - Status (open/closed) - Date range - CVSS score range
Sort Options: - Severity (highest first) - CVSS score - Discovery date - Asset count - Status
Managing Vulnerabilities¶
Vulnerability Lifecycle:
graph LR
A[Discovered] --> B[Validated]
B --> C[Assigned]
C --> D[In Remediation]
D --> E[Fixed]
E --> F[Verified]
F --> G[Closed]
Status Updates: - Mark as false positive - Assign to team member - Track remediation - Verify fixes - Close resolved
Bulk Actions: - Update multiple vulnerabilities - Export to CSV - Generate reports - Assign in bulk - Close in bulk
Findings¶
What are Findings?¶
Findings are security observations that may not be vulnerabilities but are noteworthy.
Finding Types: - Informational: Interesting observations - Best Practice: Recommendations - Configuration: Suboptimal settings - Compliance: Policy violations - Anomalies: Unusual patterns
Finding Information: - Title and description - Severity/priority - Affected assets - Evidence - Recommendations - References
Managing Findings¶
Finding Workflow: 1. Review finding 2. Validate accuracy 3. Assess impact 4. Document recommendations 5. Track resolution 6. Verify implementation
Finding Actions: - Add notes - Attach evidence - Link to vulnerabilities - Assign to team - Track status - Export data
Reports¶
Report Types¶
Executive Summary: - High-level overview - Key findings - Risk assessment - Recommendations - Non-technical language
Technical Report: - Detailed findings - Technical evidence - Exploitation details - Remediation steps - Technical appendices
Compliance Report: - Framework mapping - Compliance status - Gap analysis - Remediation plan - Evidence documentation
Trend Report: - Historical analysis - Vulnerability trends - Asset growth - Risk evolution - Comparative analysis
Generating Reports¶
Quick Report: 1. Navigate to Intelligence → Reports 2. Click Generate Report 3. Select template 4. Choose engagement/campaign 5. Configure options 6. Generate
Custom Report: 1. Use Reporting Engine 2. Build custom template 3. Select data sources 4. Configure layout 5. Generate and save
See Reporting Engine
Analytics¶
Vulnerability Analytics¶
Key Metrics: - Total vulnerabilities - By severity - By asset type - By engagement - Trend over time - Remediation rate
Visualizations: - Severity distribution (pie chart) - Vulnerability trend (line chart) - Top vulnerabilities (bar chart) - Asset vulnerability density (heat map)
Asset Analytics¶
Asset Metrics: - Total assets discovered - Asset growth rate - Assets by type - Assets by engagement - Asset relationships
Visualizations: - Asset type distribution - Discovery timeline - Relationship graph - Coverage heat map
Risk Analytics¶
Risk Metrics: - Overall risk score - Risk by asset - Risk by engagement - Risk trend - Risk reduction
Risk Calculation:
Data Export¶
Export Formats¶
Available Formats: - CSV (data tables) - JSON (structured data) - PDF (reports) - XML (structured data) - HTML (web reports)
Export Options¶
Export Vulnerabilities: 1. Navigate to Vulnerabilities 2. Apply filters 3. Click Export 4. Select format 5. Download
Export Findings: 1. Navigate to Findings 2. Apply filters 3. Click Export 4. Select format 5. Download
Export Reports: 1. Generate report 2. Select export format 3. Download
Integration¶
SIEM Integration¶
Forward vulnerability data to SIEM:
Supported SIEMs: - Splunk - ELK Stack - QRadar - ArcSight - LogRhythm
Configuration: 1. Navigate to Configuration → Integrations 2. Select SIEM type 3. Configure endpoint 4. Set authentication 5. Test connection 6. Enable integration
Ticketing Integration¶
Create tickets automatically:
Supported Systems: - Jira - ServiceNow - GitHub Issues - Azure DevOps
Auto-Ticketing Rules: - Critical vulnerabilities → Immediate ticket - High vulnerabilities → Ticket within 24h - Medium vulnerabilities → Weekly batch - Low vulnerabilities → Monthly batch
API Access¶
Programmatic access to intelligence data:
# Get vulnerabilities
curl -H "Authorization: Bearer $TOKEN" \
https://api.hive.darksidesecurity.io/vulnerabilities
# Get specific vulnerability
curl -H "Authorization: Bearer $TOKEN" \
https://api.hive.darksidesecurity.io/vulnerabilities/VULN_ID
# Update vulnerability status
curl -X PATCH \
-H "Authorization: Bearer $TOKEN" \
-H "Content-Type: application/json" \
-d '{"status": "in_remediation"}' \
https://api.hive.darksidesecurity.io/vulnerabilities/VULN_ID
Best Practices¶
Vulnerability Management¶
✅ Prioritize by Risk: Focus on critical/high first
✅ Validate Findings: Confirm before reporting
✅ Track Remediation: Monitor fix progress
✅ Verify Fixes: Retest after remediation
✅ Document Evidence: Keep proof
Reporting¶
✅ Know Your Audience: Tailor to readers
✅ Clear Language: Avoid jargon
✅ Provide Context: Explain impact
✅ Actionable Recommendations: How to fix
✅ Professional Presentation: Quality matters
Analysis¶
✅ Look for Patterns: Identify trends
✅ Correlate Findings: Connect related issues
✅ Track Over Time: Monitor improvements
✅ Benchmark: Compare to industry
✅ Continuous Improvement: Learn and adapt
Troubleshooting¶
Vulnerabilities Not Showing¶
Check: - Scans completed successfully - Results processed - Filters not hiding data - Correct engagement selected
Report Generation Failed¶
Verify: - Data exists - Template is valid - Permissions sufficient - Network connectivity
Export Not Working¶
Try: - Reduce data size - Check browser settings - Clear cache - Try different format
Related: Vulnerabilities | Reporting Engine | Dashboard Metrics