📜 Certificate Transparency Pretraga (CT Log)

Analiziraj arhiv baze Certificate Transparency Logs kako bi otkrili skrivene subdomene i podatke o izdanim TLS certifikatima.

Definiranje mehanizma transparentne CT arhive

Kao preduvjet SSL autentikacije, uvođenjem globalnog standarda bilježi se svaki izdani certifikat čime se smanjuje rizik od lažnih autorizacija.

Slučajevi korištenja IT profesionalaca:

  • Bug Bounty mapiranje arhitekture: Identifikacija meta. Find all subdomains that have been issued SSL certificates.
  • Brand Phishing nadzor: Rano otkrivanje lažnih portala. Detect unauthorized certificates issued for your domain.
  • OSINT pretraga: Sistemski nadzor i istrage. Security professionals use CT logs during penetration testing.
  • Inventory Management: Pregled isticanja trenutnih certifikata. Verify that your organization's certificates are properly logged.

Važna pitanja o CT logovima

Dokazuje li taj projekt sigurnosnu ispravnost domene u borbi protiv cyber kriminala?

Da. Obavezni zapis transparentne povijesti izdavanja certifikata omogućava preglednicima poput Chrome-a blakiranje lažnih i opasnih veza.

Snima li CT pretraga certifikate iz moje interne lokalne mreže?

Ne. CT log je striktno u vezi javnih SSL certifikata izdanih od globalnih ustanova (CA). Interne (Self-signed) adrese i certifikati se ne objavljuju u javnoj bazi.

Searches public Certificate Transparency logs to find all SSL/TLS certificates ever issued for a domain, detecting unauthorized certificates.

Key Facts

  • All major CAs must log certificates since 2018
  • Over 8 billion certificates in CT logs
  • Chrome rejects certificates not in CT
  • CT detected multiple CA misissuance incidents

Frequently Asked Questions

What is Certificate Transparency?

Open framework logging all SSL certificates. CAs must log issued certs, enabling detection of unauthorized issuance.

Why check CT logs?

Reveals all certs for your domain including unknown subdomains, unauthorized certs, and phishing attempts.

Can CT reveal subdomains?

Yes. CT logs are public and include all domains on certificates. Use wildcards to avoid exposing subdomains.