Skip to main content
DFIRLab
ResearchUse CasesCompare
Intel BriefingsThreat Actors
IOC CheckFile AnalyzerPhishing CheckDomain LookupExposure ScannerPrivacy Check
WikiAbout
PlatformNew
DFIRLab

Security research, threat intelligence, and free DFIR tools.

Tools

Phishing CheckerExposure ScannerDomain LookupFile AnalyzerPrivacy CheckAPI Playground

Use Cases

SOC Phishing TriageIR IOC EnrichmentMSSP Exposure Monitoringn8n AutomationSee all use cases →

Compare

vs VirusTotalvs Shodanvs TheHiveSee all 8 →

Resources

DFIR WikiIntel BriefingsAboutPlatformAPI Docs

Legal

Privacy PolicyRSS FeedSitemap

© 2026 DFIR Lab. All rights reserved.

Wiki/Threat Intelligence

Certificate Transparency

A public logging framework that records all SSL/TLS certificates issued by certificate authorities, enabling detection of unauthorized or suspicious certificates.

Definition

Certificate Transparency (CT) is an open framework, defined in RFC 6962, that requires certificate authorities (CAs) to log every SSL/TLS certificate they issue to publicly auditable, append-only logs. Anyone can query these logs to see certificates issued for any domain, allowing domain owners, security researchers, and automated systems to monitor for misissued or unauthorized certificates.

Why It Matters

Certificate Transparency closes a significant blind spot in PKI trust. Before CT, a compromised or rogue CA could issue certificates for any domain without the domain owner's knowledge, enabling man-in-the-middle attacks at scale. CT logs also expose attacker infrastructure: threat actors frequently obtain TLS certificates for phishing and typosquatting domains shortly before launching campaigns, making CT monitoring a valuable early-warning signal for attack surface changes.

How It Works

When a CA issues a certificate, it submits the certificate to one or more CT logs and receives a Signed Certificate Timestamp (SCT) in return. The SCT is embedded in the certificate, stapled via OCSP, or delivered via TLS extension, allowing browsers to verify the certificate was logged. Analysts query CT logs — most commonly via crt.sh, which aggregates multiple logs — to enumerate subdomains, track certificate issuance for a domain, and identify certificates for suspicious lookalike domains.

DFIR Platform

Exposure Scanner

The DFIR Lab Exposure Scanner uses crt.sh — a Certificate Transparency log aggregator — as one of its 11 intelligence providers for subdomain discovery. CT data surfaces subdomains and hostnames that may not be visible through DNS enumeration alone, expanding the discovered attack surface for monitored assets

View Documentation

Related Concepts

Attack Surface ManagementSSL/TLS CertificatesDNS Security

Try these concepts in practice

Free tier with 100 credits/month. No credit card needed.

Start Free