# Vulnerability Management

Blog

Our Path to Product-Led Growth

May 22, 2022

Recent Posts

By Nikola Kundacina
May 22, 2022

OSINT Basics – What is OSINT and Why Do We Do/Need OSINT?


By Kent Weigle
May 16, 2022

What is OS Fingerprinting?

How OS Fingerprinting  Works: Fundamentals You Need to Know

By Nikola Kundacina
May 16, 2022

John the Ripper Pt.4

Intro

In this article – the last in our John the Ripper series – we would like to focus on how we can use John to crack SSH keys, as well as mention some basics of Custom Rules.

 

By Nikola Kundacina
May 09, 2022

John the Ripper Pt. 3

Intro

It should come as no surprise that John can also deal with .zip and .rar archives. John does this by leveraging the zip2john and rar2john utilities, built in the tool, so that it can ingest something that it will know how to use. The syntax is pretty much the same, and by now, you should be quite familiar with it; still, we will use this article to show some examples of how we can make our .zip and .rar archives John-ready. As we will see, this is akin to the unshadow tool we’ve used previously.

 

By Evan Kling
May 05, 2022

Can Old Vulnerabilities Learn New Tricks?

The public’s favorite government agency, CISA (not the CIA) has recently added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, the living, breathing, exponentially growing list of vulnerabilities that have seen active exploitation in the wild.

By Nikola Kundacina
May 02, 2022

John the Ripper Pt. 2

Intro

Authentication hashes are stored and kept by operating systems. Really, they are just hashed values of passwords. It might be possible to brute force these, but oftentimes you would need some sort of privileged permissions in order to obtain them, so it is somewhat of a more difficult task.

By Nikola Kundacina
Apr 27, 2022

John the Ripper Pt.1

Intro

John The Ripper, or John for short, is one of the most well known password and hash cracking tools out there. John is extremely versatile, most importantly, it is extremely fast, with a really big range of compatible types of hashes, not just the most common ones like SHA1, SHA256, MD5, etc. It is also worth mentioning that John will work on all of the three most common operating systems – Windows, MacOS, and Linux-based distros. For Windows, there’s also the Hash Suite, developed by a John the Ripper Contributor. 

Hashes

Hashing, most simply put, is the act of taking a piece of data (of any length) and representing it in another shape, that is of fixed length. We do so by passing our original data through an algorithm – hashing algorithm. Some more popular examples are: NTLM, MD4, SHA512.

As an example, take my name  – acephale as an input string and pass it through a SHA256 algorithm, and we get the following string of characters:

By Michael Assraf
Apr 27, 2022

Vicarius Unlocks Nmap for Vulnerability Remediation

Vicarius Unlocks Nmap for Vulnerability Remediation

By Nikola Kundacina
Apr 13, 2022

Nmap Advanced Uses Pt.4: NSE

Intro

Now that we have covered some of the more important features of Nmap, we would like to talk about one of the most, if not the most, important features: NSE, short for Nmap Scripting Engine. Firstly, let’s mention the fact that the set of NSE scripts is quite diverse and constantly growing. NSE was designed to be flexible, specifically for network discovery, more sophisticated version detection, backdoor detection, vulnerability detection and exploitation.

By Nikola Kundacina
Apr 06, 2022

Nmap Advanced Uses Pt.3: Firewall Evasion

Intro

Today, firewalls are an essential part of almost every IT infrastructure and are being deployed in a myriad of shapes and forms. They usually focus on layers 3 and 4 of the OSI Model (occasionally layer 2). Next-generation Firewalls (NGFW) can also cover layers 5, 6, and 7. With more layers covered, we gain more control, but also spend more computing power.

By Kent Weigle
Apr 04, 2022

Cybersecurity takes a Community: 10 Popular Cybersecurity Communities to Join

As the saying goes, "no man is an island." This statement holds in today's cybersecurity landscape.

By Kent Weigle
Mar 25, 2022

Mac Patching Best Practices

As vulnerabilities and threats become more sophisticated, having a reliable and automated Mac patch management solution for your organization's devices is essential. This is important if you are using a lot of custom applications that may be hard to update. 

By Nikola Kundacina
Mar 24, 2022

Nmap Advanced Uses Pt.2

Intro

In this article we will look further into some of the options that Nmap offers. Since we have looked into the Null, Xmas, and FIN scans, we will continue down this path of port scanning techniques, and for this article we will focus on ACK Scan (-sA),  Window Scan (-sW), and Maimon Scan (-sM). 

By Nikola Kundacina
Mar 24, 2022

Nmap Advanced Uses Pt.1

Intro

If you’re familiar with Nmap, you are probably aware of the myriad of options it has to offer. I have opted to use example scans for our purposes in hopes of being able to more easily demonstrate some of those options. 

By Kent Weigle
Mar 21, 2022

A Minor MITRE ATT&CK Rundown

MITRE ATT&K and the Pyramid of Pain: An Introduction

Before we delve into the MITRE ATT&CK framework, I’d like to give a little context to set the stage. Though wheels are turning, much of cybersecurity is still mired in “tradition.” That is to say, analysts are reading reports, journals, academic papers, news stories, etc. Relevant data is then transferred to a database or stored in their personal biological hard drive, their head. All of this data is then transferred to written reports that are then given to consumers.