Social Engineering Domain Enrichment
Social Engineering Domain Analysis Pack.#
This Playbook is part of theSupported versions
Supported Cortex XSOAR versions: 6.2.0 and later.
Enrich a domain and compare against your registered domain for potential social engineering against your organization.
#
DependenciesThis playbook uses the following sub-playbooks, integrations, and scripts.
#
Sub-playbooksThis playbook does not use any sub-playbooks.
#
Integrations- Rasterize
#
Scripts- GetStringsDistance
- AddDBotScoreToContext
- GetListRow
- DeleteContext
- GetDomainDNSDetails
#
Commands- setIndicator
- rasterize
- enrichIndicators
- whois
- createNewIndicator
#
Playbook InputsName | Description | Default Value | Required |
---|---|---|---|
RegisteredDomain | Your company domain to use for checking if potential InputDomains are potentially used for typosquatting and other similar domain attacks. | paloaltonetworks.com | Optional |
InputDomain | The potentially malicious domain to check | palonetworks.com | Optional |
BadNameservers | The csv of known bad nameservers Example: nameserver examplenameserver1 examplenameserver2 examplenameserver3 | BadNameservers | Optional |
LevenshteinDistance | The Levenshtein distance to consider close. Lower scores mean strings are more similar | 10 | Optional |
#
Playbook OutputsThere are no outputs for this playbook.