<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>vulnerability analysis Archives - Tech Chronicles</title>
	<atom:link href="http://kostacipo.stream/tag/vulnerability-analysis/feed/" rel="self" type="application/rss+xml" />
	<link>https://kostacipo.stream/tag/vulnerability-analysis/</link>
	<description>Ramblings of a Tech Dude</description>
	<lastBuildDate>Mon, 29 Nov 2021 14:32:24 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.8.2</generator>

<image>
	<url>https://kostacipo.stream/wp-content/uploads/2019/12/cropped-profile-32x32.jpg</url>
	<title>vulnerability analysis Archives - Tech Chronicles</title>
	<link>https://kostacipo.stream/tag/vulnerability-analysis/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Graudit: Source Code Auditing Tool</title>
		<link>http://kostacipo.stream/graudit-source-code-auditing-tool/</link>
					<comments>http://kostacipo.stream/graudit-source-code-auditing-tool/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Mon, 29 Nov 2021 14:32:24 +0000</pubDate>
				<category><![CDATA[Vulnerability Analysis]]></category>
		<category><![CDATA[vulnerability analysis]]></category>
		<category><![CDATA[vulnerability scanning]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2113</guid>

					<description><![CDATA[<p>Graudit allows the user to find potential vulnerabilities within the source code of a software. It uses the GNU utility grep to compare the source code with signature sets within different databases. It is comparable to other analyzers such as RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and retaining its flexibility. Graudit: Source Code Auditing Tool [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/graudit-source-code-auditing-tool/">Graudit: Source Code Auditing Tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Graudit allows the user to find potential vulnerabilities within the source code of a software. It uses the GNU utility <code>grep</code><em> </em>to compare the source code with signature sets within different databases. It is comparable to other analyzers such as RATS, SWAAT and flaw-finder while keeping the technical requirements to a minimum and retaining its flexibility.</p>
<h2>Graudit: Source Code Auditing Tool</h2>
<p>This tool involves different databases which are included within the tool which are compared with extended regular expressions (POSIX). The user has the option to add additional databases or create their own ones if needed. The databases support a huge range of languages from JavaScript to Python. Lastly, the user has the option to scan a single file or scan multiple files at the same time.</p>
<div class="alert alert-info"><b>Note</b>: The user has the option to install the tool locally or globally by acting as a superuser. It is however recommended by the developer to clone the repository to that all of the latest database are included within the software.</div>
<div class="alert alert-secondary pt-0">
<h3 class="accent-purple">Databases</h3>
<p>The default database contains generic rules which aim to sniff out common vulnerabilities within the source code. In addition to this, there are databases for:</p>
<p>– ASP.NET, C, .NET, JSP, Perl, PHP and Python.</p>
<p>The ‘all’ database combines all of the mentioned databases into a single database. The developer recommends first using the default database to find common vulnerabilities and then use language specific databases to find additional vulnerabilities.</p></div>
<h3 class="accent-green">Features:</h3>
<ul>
<li>Portable, Flexible and easy to use</li>
<li>Option to add custom databases</li>
<li>Ensure that source code does not have any vulnerabilities saving the user from future headaches</li>
<li>Supports many different languages ensuring that whichever language you use, you will be protected with this tool</li>
<li>When compared with other tools, this tool has lower technical requirments ensuring it can run on most systems</li>
</ul>
<h3 class="accent-green">Supported Platforms:</h3>
<ul>
<li>Linux</li>
</ul>
<h3 class="accent-green">Requirements:</h3>
<ul>
<li>None</li>
</ul>
<h2>Install</h2>
<p>Clone the GitHub repo:</p>
<pre class="wp-block-code"><code>$ git clone https://github.com/wireghoul/graudi </code></pre>
<p>You can then symlink graudit so it is in path:</p>
<pre class="wp-block-code"><code>$ ln -s ~/graudit/graudit ~/bin/graudit </code></pre>
<h2>Graudit Usage</h2>
<p>Enter the following command:</p>
<pre class="wp-block-code"><code>$ graudit -h </code></pre>
<h3 class="accent-purple">Available Options:</h3>
<pre class="wp-block-preformatted">===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  &gt;  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.6 written by @Wireghoul
=================================[justanotherhacker.com]===
Usage: graudit [opts] /path/to/scan

OPTIONS 
  -d  database to use or /path/to/file.db (uses default if not specified) 
  -A scan ALL files 
  -x exclude these files (comma separated list: -x *.js,*.sql) 
  -i case in-sensitive scan 
  -c  number of lines of context to display, default is 2 

  -B suppress banner 
  -L vim friendly lines 
  -b colour blind friendly template 
  -z suppress colors 
  -Z high contrast colors 

  -l lists databases available 
  -v prints version number 
  -h prints this help screen</pre>
<div class="row justify-content-center mb-3">
<div class="col-lg-4">DOWNLOAD Graudit</div>
</div>
<p>The post <a href="http://kostacipo.stream/graudit-source-code-auditing-tool/">Graudit: Source Code Auditing Tool</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/graudit-source-code-auditing-tool/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Grype – Vulnerability Scanner For Container Images &#038; Filesystems</title>
		<link>http://kostacipo.stream/grype-vulnerability-scanner-for-container-images-filesystems/</link>
					<comments>http://kostacipo.stream/grype-vulnerability-scanner-for-container-images-filesystems/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sat, 08 May 2021 23:48:31 +0000</pubDate>
				<category><![CDATA[DevOps]]></category>
		<category><![CDATA[Linux]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Vulnerability Analysis]]></category>
		<category><![CDATA[containers]]></category>
		<category><![CDATA[vulnerability analysis]]></category>
		<category><![CDATA[vulnerability scanning]]></category>
		<guid isPermaLink="false">https://kostacipo.stream/?p=2092</guid>

					<description><![CDATA[<p>Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based operating systems. Features of Grype Vulnerability Scanner For Container Images &#38; Filesystems Scan the contents of a container image or filesystem to find known vulnerabilities and find vulnerabilities for major [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/grype-vulnerability-scanner-for-container-images-filesystems/">Grype – Vulnerability Scanner For Container Images &#038; Filesystems</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<h4>Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based operating systems.</h4>
<p><img fetchpriority="high" decoding="async" class="size-medium wp-image-5546 alignnone" src="https://cdn.darknet.org.uk/wp-content/uploads/2021/04/Grype-Vulnerability-Scanner-For-Container-Images-Filesystems-640x296.png" sizes="(max-width: 640px) 100vw, 640px" srcset="https://cdn.darknet.org.uk/wp-content/uploads/2021/04/Grype-Vulnerability-Scanner-For-Container-Images-Filesystems-640x296.png 640w, https://cdn.darknet.org.uk/wp-content/uploads/2021/04/Grype-Vulnerability-Scanner-For-Container-Images-Filesystems-1024x474.png 1024w, https://cdn.darknet.org.uk/wp-content/uploads/2021/04/Grype-Vulnerability-Scanner-For-Container-Images-Filesystems.png 1285w" alt="Grype - Vulnerability Scanner For Container Images &amp; Filesystems" width="640" height="296" /></p>
<h2>Features of Grype Vulnerability Scanner For Container Images &amp; Filesystems</h2>
<p>Scan the contents of a container image or filesystem to find known vulnerabilities and find vulnerabilities for major operating system packages in:</p>
<ul>
<li>Alpine</li>
<li>BusyBox</li>
<li>CentOS / Red Hat</li>
<li>Debian</li>
<li>Ubuntu</li>
</ul>
<p>Find vulnerabilities for language-specific packages:</p>
<ul>
<li>Ruby (Bundler)</li>
<li>Java (JARs, etc)</li>
<li>JavaScript (NPM/Yarn)</li>
<li>Python (Egg/Wheel)</li>
<li>Python pip/requirements.txt/setup.py listings</li>
</ul>
<p>Grype Supports Docker and OCI image formats.</p>
<h3>Using Grype Vulnerability Scanner For Container Images &amp; Filesystems</h3>
<p>To scan for vulnerabilities in an image:</p>
<p><code>grype &lt;image&gt;</code></p>
<p>Grype can scan a variety of sources beyond those found in Docker.</p>
<div class="crayon-pre">
<div id="crayon-60971100a73d9062039687-1" class="crayon-line"><code><span class="crayon-p"># scan a container image archive (from the result of `docker image save ...`, `podman save ...`, or `skopeo copy` commands)</span></code></div>
<div id="crayon-60971100a73d9062039687-2" class="crayon-line crayon-striped-line"><code><span class="crayon-e">grype </span><span class="crayon-v">path</span><span class="crayon-o">/</span><span class="crayon-st">to</span><span class="crayon-o">/</span><span class="crayon-v">image</span><span class="crayon-sy">.</span><span class="crayon-v">tar</span></code></div>
<div id="crayon-60971100a73d9062039687-3" class="crayon-line"></div>
<div id="crayon-60971100a73d9062039687-4" class="crayon-line crayon-striped-line"><code><span class="crayon-p"># scan a directory</span></code></div>
<div id="crayon-60971100a73d9062039687-5" class="crayon-line"><code><span class="crayon-e">grype </span><span class="crayon-v">dir</span><span class="crayon-o">:</span><span class="crayon-v">path</span><span class="crayon-o">/</span><span class="crayon-st">to</span><span class="crayon-o">/</span><span class="crayon-v">dir</span></code></div>
</div>
<p>The output format for Grype is configurable as well:<br />
<code><span class="crayon-v">grype</span> <span class="crayon-o">&lt;</span><span class="crayon-v">image</span><span class="crayon-o">&gt;</span> <span class="crayon-o">-</span><span class="crayon-v">o</span> <span class="crayon-o">&lt;</span><span class="crayon-v">format</span><span class="crayon-o">&gt;</span></code></p>
<p>Where the formats available are:</p>
<ul>
<li>json: Use this to get as much information out of Grype as possible!</li>
<li>cyclonedx: An XML report conforming to the CycloneDX 1.2 specification.</li>
<li>table: A columnar summary (default).</li>
</ul>
<h2>Getting started</h2>
<p><a href="https://github.com/anchore/grype#installation">Install the binary</a>, and make sure that <code>grype</code> is available in your path. To scan for vulnerabilities in an image:</p>
<pre><code>grype &lt;image&gt;
</code></pre>
<p>The above command scans for vulnerabilities that are visible in the container (i.e., the squashed representation of the image). To include software from all image layers in the vulnerability scan, regardless of its presence in the final image, provide <code>--scope all-layers</code>:</p>
<pre><code>grype &lt;image&gt; --scope all-layers
</code></pre>
<p>Grype can scan a variety of sources beyond those found in Docker.</p>
<pre><code># scan a container image archive (from the result of `docker image save ...`, `podman save ...`, or `skopeo copy` commands)
grype path/to/image.tar

# scan a directory
grype dir:path/to/dir
</code></pre>
<h3>Grype&#8217;s Database</h3>
<p>Grype pulls a database of vulnerabilities derived from the publicly available <a href="https://ancho.re/v1/service/feeds" rel="nofollow">Anchore Feed Service</a>. This database is updated at the beginning of each scan, but an update can also be triggered manually.</p>
<h2>Shell Completion</h2>
<p>Grype supplies shell completion through its CLI implementation (<a href="https://github.com/spf13/cobra/blob/master/shell_completions.md">cobra</a>). Generate the completion code for your shell by running one of the following commands:</p>
<ul>
<li><code>grype completion &lt;bash|fish&gt;</code></li>
<li><code>go run main.go completion &lt;bash|fish&gt;</code></li>
</ul>
<p>This will output a shell script to STDOUT, which can then be used as a completion script for Grype. Running one of the above commands with the <code>-h</code> or <code>--help</code> flags will provide instructions on how to do that for your chosen shell.</p>
<p>You can download Grype or read more <a href="https://github.com/anchore/grype">here</a>.</p>
<p>The post <a href="http://kostacipo.stream/grype-vulnerability-scanner-for-container-images-filesystems/">Grype – Vulnerability Scanner For Container Images &#038; Filesystems</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/grype-vulnerability-scanner-for-container-images-filesystems/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Vulmap : Web Vulnerability Scanning &#038; Verification Tools</title>
		<link>http://kostacipo.stream/vulmap-web-vulnerability-scanning-verification-tools/</link>
					<comments>http://kostacipo.stream/vulmap-web-vulnerability-scanning-verification-tools/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sun, 31 Jan 2021 20:10:59 +0000</pubDate>
				<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Tools]]></category>
		<category><![CDATA[Vulnerability Analysis]]></category>
		<category><![CDATA[vulnerability analysis]]></category>
		<category><![CDATA[vulnerability scanning]]></category>
		<guid isPermaLink="false">http://kostacipo.stream/?p=2019</guid>

					<description><![CDATA[<p>Vulmap is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions. Relevant testers can use vulmap to detect whether the target has a specific vulnerability, and can use the vulnerability exploitation function to verify whether the vulnerability [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/vulmap-web-vulnerability-scanning-verification-tools/">Vulmap : Web Vulnerability Scanning &#038; Verification Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><strong>Vulmap </strong>is a vulnerability scanning tool that can scan for vulnerabilities in Web containers, Web servers, Web middleware, and CMS and other Web programs, and has vulnerability exploitation functions. Relevant testers can use vulmap to detect whether the target has a specific vulnerability, and can use the vulnerability exploitation function to verify whether the vulnerability actually exists.</p>
<p>It is currently has vulnerability scanning (poc) and exploiting (exp) modes. Use “-m” to select which mode to use, and the default poc mode is the default. In poc mode, it also supports “-f” batch target scanning, “-o” File output results and other main functions, Other functions <a href="https://github.com/zhzyker/vulmap/#options">Options</a> Or python3 vulmap.py -h, the Poc function will no longer be provided in the exploit exploit mode, but the exploit will be carried out directly, and the exploit result will be fed back to further verify whether the vulnerability exists and whether it can be exploited.</p>
<p><strong>Try to use “-a” to establish target types to reduce false positives, such as “-a solr”</strong></p>
<div class="code-block code-block-2">&nbsp;</div>
<p class="has-text-align-center has-vivid-green-cyan-background-color has-background"><strong>Installation</strong></p>
<p>The operating system must have python3, python3.7 or higher is recommended</p>
<ul>
<li>Installation dependency</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>pip3 install -r requirements.txt </strong></p>
<ul>
<li>Linux &amp; MacOS &amp; Windows</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com </strong></p>
<p class="has-text-align-center has-vivid-green-cyan-background-color has-background"><strong>Options</strong></p>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background">optional arguments:<br />
-h, –help show this help message and exit<br />
-u URL, –url URL Target URL (e.g. -u “http://example.com”)<br />
-f FILE, –file FILE Select a target list file, and the url must be distinguished by lines (e.g. -f “/home/user/list.txt”)<br />
-m MODE, –mode MODE The mode supports “poc” and “exp”, you can omit this option, and enter poc mode by default<br />
-a APP, –app APP Specify a web app or cms (e.g. -a “weblogic”). default scan all<br />
-c CMD, –cmd CMD Custom RCE vuln command, Other than “netstat -an” and “id” can affect program judgment. defautl is “netstat -an”<br />
-v VULN, –vuln VULN Exploit, Specify the vuln number (e.g. -v “CVE-2020-2729”)<br />
–list Displays a list of vulnerabilities that support scanning<br />
–debug Debug mode echo request and responses<br />
–delay DELAY Delay check time, default 0s<br />
–timeout TIMEOUT Scan timeout time, default 10s<br />
–output FILE Text mode export (e.g. -o “result.txt”)</p>
<p class="has-text-align-center has-vivid-green-cyan-background-color has-background"><strong>Examples</strong></p>
<ul>
<li>Test all vulnerabilities poc mode</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com </strong></p>
<ul>
<li>For RCE vuln, use the “id” command to test the vuln, because some linux does not have the “netstat -an” command</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com -c “id” </strong></p>
<ul>
<li>Check <a href="http://example.com">http://example.com</a> for struts2 vuln</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com -a struts2 </strong></p>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com -m poc -a struts2</strong></p>
<ul>
<li>Exploit the CVE-2019-2729 vuln of WebLogic on <a href="http://example.com:7001">http://example.com:7001</a></li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com:7001 -v CVE-2019-2729 </strong></p>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com:7001 -m exp -v CVE-2019-2729</strong></p>
<ul>
<li>Batch scan URLs in list.txt</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -f list.txt </strong></p>
<ul>
<li>Export scan results to result.txt</li>
</ul>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>python3 vulmap.py -u http://example.com:7001 -o result.txt </strong></p>
<p class="has-text-align-center has-vivid-green-cyan-background-color has-background"><strong>Vulnerability List</strong></p>
<p>Vulmap supported vulnerabilities are as follows</p>
<pre class="wp-block-code"><code>+-------------------+------------------+-----+-----+-------------------------------------------------------------+
 | Target type       | Vuln Name        | Poc | Exp | Impact Version &amp;&amp; Vulnerability description                 |
 +-------------------+------------------+-----+-----+-------------------------------------------------------------+
 | Apache Shiro      | CVE-2016-4437    |  Y  |  Y  | &lt;= 1.2.4, shiro-550, rememberme deserialization rce         |
 | Apache Solr       | CVE-2017-12629   |  Y  |  Y  | &lt; 7.1.0, runexecutablelistener rce &amp; xxe, only rce is here  |
 | Apache Solr       | CVE-2019-0193    |  Y  |  N  | &lt; 8.2.0, dataimporthandler module remote code execution     |
 | Apache Solr       | CVE-2019-17558   |  Y  |  Y  | 5.0.0 - 8.3.1, velocity response writer rce                 |
 | Apache Struts2    | S2-005           |  Y  |  Y  | 2.0.0 - 2.1.8.1, cve-2010-1870 parameters interceptor rce   |
 | Apache Struts2    | S2-008           |  Y  |  Y  | 2.0.0 - 2.3.17, debugging interceptor rce                   |
 | Apache Struts2    | S2-009           |  Y  |  Y  | 2.1.0 - 2.3.1.1, cve-2011-3923 ognl interpreter rce         |
 | Apache Struts2    | S2-013           |  Y  |  Y  | 2.0.0 - 2.3.14.1, cve-2013-1966 ognl interpreter rce        |
 | Apache Struts2    | S2-015           |  Y  |  Y  | 2.0.0 - 2.3.14.2, cve-2013-2134 ognl interpreter rce        |
 | Apache Struts2    | S2-016           |  Y  |  Y  | 2.0.0 - 2.3.15, cve-2013-2251 ognl interpreter rce          |
 | Apache Struts2    | S2-029           |  Y  |  Y  | 2.0.0 - 2.3.24.1, ognl interpreter rce                      |
 | Apache Struts2    | S2-032           |  Y  |  Y  | 2.3.20-28, cve-2016-3081 rce can be performed via method    |
 | Apache Struts2    | S2-045           |  Y  |  Y  | 2.3.5-31, 2.5.0-10, cve-2017-5638 jakarta multipart rce     |
 | Apache Struts2    | S2-046           |  Y  |  Y  | 2.3.5-31, 2.5.0-10, cve-2017-5638 jakarta multipart rce     |
 | Apache Struts2    | S2-048           |  Y  |  Y  | 2.3.x, cve-2017-9791 struts2-struts1-plugin rce             |
 | Apache Struts2    | S2-052           |  Y  |  Y  | 2.1.2 - 2.3.33, 2.5 - 2.5.12 cve-2017-9805 rest plugin rce  |
 | Apache Struts2    | S2-057           |  Y  |  Y  | 2.0.4 - 2.3.34, 2.5.0-2.5.16, cve-2018-11776 namespace rce  |
 | Apache Struts2    | S2-059           |  Y  |  Y  | 2.0.0 - 2.5.20 cve-2019-0230 ognl interpreter rce           |
 | Apache Struts2    | S2-devMode       |  Y  |  Y  | 2.1.0 - 2.5.1, devmode remote code execution                |
 | Apache Tomcat     | Examples File    |  Y  |  N  | all version, /examples/servlets/servlet/SessionExample      |
 | Apache Tomcat     | CVE-2017-12615   |  Y  |  Y  | 7.0.0 - 7.0.81, put method any files upload                 |
 | Apache Tomcat     | CVE-2020-1938    |  Y  |  Y  | 6, 7 &lt; 7.0.100, 8 &lt; 8.5.51, 9 &lt; 9.0.31 arbitrary file read  |
 | Drupal            | CVE-2018-7600    |  Y  |  Y  | 6.x, 7.x, 8.x, drupalgeddon2 remote code execution          |
 | Drupal            | CVE-2018-7602    |  Y  |  Y  | &lt; 7.59, &lt; 8.5.3 (except 8.4.8) drupalgeddon2 rce            |
 | Drupal            | CVE-2019-6340    |  Y  |  Y  | &lt; 8.6.10, drupal core restful remote code execution         |
 | Jenkins           | CVE-2017-1000353 |  Y  |  N  | &lt;= 2.56, LTS &lt;= 2.46.1, jenkins-ci remote code execution    |
 | Jenkins           | CVE-2018-1000861 |  Y  |  Y  | &lt;= 2.153, LTS &lt;= 2.138.3, remote code execution             |
 | Nexus OSS/Pro     | CVE-2019-7238    |  Y  |  Y  | 3.6.2 - 3.14.0, remote code execution vulnerability         |
 | Nexus OSS/Pro     | CVE-2020-10199   |  Y  |  Y  | 3.x  &lt;= 3.21.1, remote code execution vulnerability         |
 | Oracle Weblogic   | CVE-2014-4210    |  Y  |  N  | 10.0.2 - 10.3.6, weblogic ssrf vulnerability                |
 | Oracle Weblogic   | CVE-2017-3506    |  Y  |  Y  | 10.3.6.0, 12.1.3.0, 12.2.1.0-2, weblogic wls-wsat rce       |
 | Oracle Weblogic   | CVE-2017-10271   |  Y  |  Y  | 10.3.6.0, 12.1.3.0, 12.2.1.1-2, weblogic wls-wsat rce       |
 | Oracle Weblogic   | CVE-2018-2894    |  Y  |  Y  | 12.1.3.0, 12.2.1.2-3, deserialization any file upload       |
 | Oracle Weblogic   | CVE-2019-2725    |  Y  |  Y  | 10.3.6.0, 12.1.3.0, weblogic wls9-async deserialization rce |
 | Oracle Weblogic   | CVE-2019-2729    |  Y  |  Y  | 10.3.6.0, 12.1.3.0, 12.2.1.3 wls9-async deserialization rce |
 | Oracle Weblogic   | CVE-2020-2551    |  Y  |  N  | 10.3.6.0, 12.1.3.0, 12.2.1.3-4, wlscore deserialization rce |
 | Oracle Weblogic   | CVE-2020-2555    |  Y  |  Y  | 3.7.1.17, 12.1.3.0.0, 12.2.1.3-4.0, t3 deserialization rce  |
 | Oracle Weblogic   | CVE-2020-2883    |  Y  |  Y  | 10.3.6.0, 12.1.3.0, 12.2.1.3-4, iiop t3 deserialization rce |
 | Oracle Weblogic   | CVE-2020-14882   |  Y  |  Y  | 10.3.6.0, 12.1.3.0, 12.2.1.3-4, 14.1.1.0.0, console rce     |
 | RedHat JBoss      | CVE-2010-0738    |  Y  |  Y  | 4.2.0 - 4.3.0, jmx-console deserialization any files upload |
 | RedHat JBoss      | CVE-2010-1428    |  Y  |  Y  | 4.2.0 - 4.3.0, web-console deserialization any files upload |
 | RedHat JBoss      | CVE-2015-7501    |  Y  |  Y  | 5.x, 6.x, jmxinvokerservlet deserialization any file upload |
 | ThinkPHP          | CVE-2019-9082    |  Y  |  Y  | &lt; 3.2.4, thinkphp rememberme deserialization rce            |
 | ThinkPHP          | CVE-2018-20062   |  Y  |  Y  | &lt;= 5.0.23, 5.1.31, thinkphp rememberme deserialization rce  |
 +-------------------+------------------+-----+-----+-------------------------------------------------------------+</code></pre>
<p class="has-text-align-center has-vivid-green-cyan-background-color has-background"><strong>Docker</strong></p>
<p class="has-vivid-green-cyan-color has-black-background-color has-text-color has-background"><strong>docker build -t vulmap/vulmap .<br />
docker run –rm -ti vulmap/vulmap python vulmap.py -u https://www.example.com</strong></p>
<div class="wp-block-buttons aligncenter">
<div class="wp-block-button is-style-outline"><a class="wp-block-button__link has-vivid-cyan-blue-background-color has-background" href="https://github.com/zhzyker/vulmap" target="_blank" rel="noreferrer noopener"><strong>Download</strong></a></div>
</div>
<p>The post <a href="http://kostacipo.stream/vulmap-web-vulnerability-scanning-verification-tools/">Vulmap : Web Vulnerability Scanning &#038; Verification Tools</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/vulmap-web-vulnerability-scanning-verification-tools/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Vuls &#8211; Vulnerability Scanner</title>
		<link>http://kostacipo.stream/vuls-vulnerability-scanner/</link>
					<comments>http://kostacipo.stream/vuls-vulnerability-scanner/#respond</comments>
		
		<dc:creator><![CDATA[Majordomo]]></dc:creator>
		<pubDate>Sun, 01 Nov 2020 22:12:38 +0000</pubDate>
				<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Hacks]]></category>
		<category><![CDATA[Pentesting]]></category>
		<category><![CDATA[Vulnerability Analysis]]></category>
		<category><![CDATA[vulnerability analysis]]></category>
		<guid isPermaLink="false">http://www.kostacipo.stream/?p=1843</guid>

					<description><![CDATA[<p>Vuls is an agentless vulnerability scanner for Linux and FreeBSD servers. It makes the job of every system administrator much easier by automatically scanning for vulnerabilities and then informing the system administrator which services and servers are affected. Abstract For a system administrator, having to perform security vulnerability analysis and software update on a daily [&#8230;]</p>
<p>The post <a href="http://kostacipo.stream/vuls-vulnerability-scanner/">Vuls &#8211; Vulnerability Scanner</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="row">
<div class="col-lg-12">
<p style="text-align: justify;"><a href="https://github.com/future-architect/vuls">Vuls</a> is an agentless vulnerability scanner for Linux and FreeBSD servers. It makes the job of every system administrator much easier by automatically scanning for vulnerabilities and then informing the system administrator which services and servers are affected.</p>
<p style="text-align: justify;"><a href="https://raw.githubusercontent.com/usiusi360/vulsrepo/master/gallery/demo.gif" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://raw.githubusercontent.com/usiusi360/vulsrepo/master/gallery/demo.gif" alt="Vulsrepo"></a></p>
<p style="text-align: justify;"><a href="https://asciinema.org/a/3y9zrf950agiko7klg8abvyck" rel="nofollow"><img decoding="async" class="" src="https://camo.githubusercontent.com/8b98ecf54d6a835756964168969b42d3aaa86048/68747470733a2f2f61736369696e656d612e6f72672f612f3379397a72663935306167696b6f376b6c673861627679636b2e706e67" alt="asciicast" data-canonical-src="https://asciinema.org/a/3y9zrf950agiko7klg8abvyck.png" width="910" height="583"></a></p>
<p style="text-align: justify;"><a href="https://github.com/future-architect/vuls/blob/master/img/vuls-slack-en.png" target="_blank" rel="noopener noreferrer"><img decoding="async" src="https://github.com/future-architect/vuls/raw/master/img/vuls-slack-en.png" alt="Vuls-slack"></a></p>
<hr>
<h2 style="text-align: justify;">Abstract</h2>
<p style="text-align: justify;">For a system administrator, having to perform security vulnerability analysis and software update on a daily basis can be a burden. To avoid downtime in a production environment, it is common for a system administrator to choose not to use the automatic update option provided by the package manager and to perform update manually. This leads to the following problems.</p>
<ul style="list-style-type: circle;">
<li>The system administrator will have to constantly watch out for any new vulnerabilities in NVD (National Vulnerability Database) or similar databases.</li>
<li>It might be impossible for the system administrator to monitor all the software if there are a large number of software packages installed in the server.</li>
<li>It is expensive to perform analysis to determine the servers affected by new vulnerabilities. The possibility of overlooking a server or two during analysis is there.</li>
</ul>
<p style="text-align: justify;">Vuls is a tool created to solve the problems listed above. It has the following characteristics.</p>
<ul>
<li>Informs users of the vulnerabilities that are related to the system.</li>
<li>Informs users of the servers that are affected.</li>
<li>Vulnerability detection is done automatically to prevent any oversight.</li>
<li>A report is generated on a regular basis using CRON or other methods. to manage vulnerability.</li>
</ul>
<h2 style="text-align: justify;">&nbsp;</h2>
<h2 style="text-align: justify;">Vuls Scanner</h2>
<p style="text-align: justify;">Vuls automatically scans through many different vulnerability databases including NVD, JVN and OVAL. This makes it easier for system administrators who must overlook servers which are running numerous software’s. After scanning the database, Vuls will generate a report which can be accessed through the GUI or a TUI. Vuls will give details about each vulnerability such as its severity level, description and released fixes. Vuls can also search for Non-OS packages and WordPress core, themes and plugins.</p>
<h3 class="accent-green" style="text-align: justify;">Features:</h3>
<ol>
<li>Scan for all vulnerabilities in Linux and FreeBSD servers</li>
<li>Vuls ensures a high-quality scan by scanning through multiple vulnerability servers</li>
<li>Multiple scan modes are available depending on the resource availability of the server. These range from fast mode to deep mode (Fast Scan, Fast Root Scan, Remote and Local Scan, Server Mode)</li>
<li>Dynamic and Static Analysis</li>
<li>Scan vulnerability of Non-OS packages such as libraries of programming languages and network devices</li>
<li>Scan through WordPress core, themes, plugins</li>
</ol>
<h3>&nbsp;</h3>
<h3 class="accent-green" style="text-align: justify;">Supported Platforms:</h3>
<div class="alert alert-success" style="text-align: justify;">Alpine, Ubuntu, Debian, RHEL, Oracle Linux, CentOS, Amazon Linux, FreeBSD, SUSE Enterprise, Raspbian</div>
<h3 class="accent-green" style="text-align: justify;">Requirements:</h3>
<ol>
<li>Docker</li>
<li>SQLite3, MySQL, PostgreSQL, Redis</li>
<li>git</li>
<li>gcc</li>
<li>GNU Make</li>
<li>go v1.13+ (The latest version is recommended)</li>
</ol>
<h2>&nbsp;</h2>
<h2 style="text-align: justify;">Install</h2>
<p style="text-align: justify;">Install Docker:</p>
<pre class="wp-block-preformatted">$ sudo systemctl start docker</pre>
<p style="text-align: justify;">Clone Vulsctl and fetch vulnerability databases:</p>
<pre class="wp-block-preformatted">$ git clone https://github.com/vulsio/vulsctl.git 
$ cd vulsctl
$ ./update-all.sh</pre>
<p style="text-align: justify;">Prepare <code>config.toml</code> in the same directory:</p>
<pre class="wp-block-preformatted">$ cat $HOME/vulsctl/config.toml
 [servers]
 [servers.hostos]
 host = "52.10.10.10"
 port = "22"
 user = "centos"
 keypath in the Vuls docker container
 keyPath     = "/root/.ssh/id_rsa"</pre>
<p style="text-align: justify;">SSH before scanning to add fingerprint to <code>$HOME/.ssh/known_hosts</code> on the Docker host:</p>
<pre class="wp-block-preformatted">$ ssh centos@52.100.100.100 -i ~/.ssh/id_rsa.pem
$ ./scan.sh 
$ ./report.sh 
$ ./tui.sh</pre>
<h3 class="accent-purple" style="text-align: justify;">Install With Docker</h3>
<p style="text-align: justify;">Run the following commands:</p>
<pre class="wp-block-preformatted">$ docker pull vuls/go-cve-dictionary
$ docker run --rm vuls/go-cve-dictionary –v
$ docker pull vuls/goval-dictionary
$ docker run --rm vuls/goval-dictionary –v
$ docker pull vuls/gost
$ docker run --rm vuls/gost -v
$ docker pull vuls/vuls
$ docker run --rm vuls/vuls -v</pre>
<h2 style="text-align: justify;">How to use Vuls</h2>
<h3 class="accent-purple" style="text-align: justify;">Local Scanning Mode</h3>
<p style="text-align: justify;">Once you deployed Vuls, go ahead and create a config file:</p>
<pre class="wp-block-preformatted">$ cd $HOME 
$ cat config.toml 

[servers] [servers.localhost] 
host = "localhost" 
port = "local"</pre>
<p style="text-align: justify;">Run the following command to start scan:</p>
<pre class="wp-block-preformatted">$ vuls scan</pre>
<h4 style="text-align: justify;">Reporting</h4>
<p style="text-align: justify;">To view one line summary:</p>
<pre class="wp-block-preformatted">$ vuls report -format-one-line-text</pre>
<p style="text-align: justify;">To view short summary:</p>
<pre class="wp-block-preformatted">$ vuls report -format-list</pre>
<p style="text-align: justify;">Full report:</p>
<pre class="wp-block-preformatted">$ vuls report -format-full-text | less</pre>
<p style="text-align: justify;">To run Terminal Based User Interface:</p>
<pre class="wp-block-preformatted">$ vuls tui</pre>
<h3 class="accent-purple" style="text-align: justify;">Scan via Docker</h3>
<p style="text-align: justify;">Prepare log directory:</p>
<pre class="wp-block-preformatted">$ cd /path/to/working/dir
$ mkdir go-cve-dictionary-log goval-dictionary-log gost-log go-exploitdb-log</pre>
<p style="text-align: justify;">Fetch various Vulnerability Directories:</p>
<pre class="wp-block-preformatted">$ for i in <code>seq 2004 $(date +"%Y")</code>; do \ docker run --rm -it \ -v $PWD:/vuls \ -v $PWD/go-cve-dictionary-log:/var/log/vuls \ vuls/go-cve-dictionary fetchnvd -years $i; \ done $ docker run --rm -i \ -v $PWD:/vuls \ -v $PWD/gost-log:/var/log/gost \ vuls/gost fetch redhat $ docker run --rm -i \ -v $PWD:/vuls \ -v $PWD/gost-log:/var/log/gost \ vuls/gost fetch redhat $ docker run --rm -i \ -v $PWD:/vuls \ -v $PWD/go-exploitdb-log:/var/log/go-exploitdb \ vuls/go-exploitdb fetch exploitdb</pre>
<p style="text-align: justify;">Create <code>config.toml</code> using <a href="https://vuls.io/docs/en/usage-settings.html" target="_blank" rel="noreferrer noopener nofollow" aria-label=" (opens in a new tab)">this</a> as a sample.</p>
<p style="text-align: justify;">Configtest:</p>
<pre class="wp-block-preformatted">$ docker run --rm -it\
     -v ~/.ssh:/root/.ssh:ro \
     -v $PWD:/vuls \
     -v $PWD/vuls-log:/var/log/vuls \
     vuls/vuls configtest \
     -config=./config.toml # path to config.toml in docker</pre>
<p style="text-align: justify;">Scan:</p>
<pre class="wp-block-preformatted">$ docker run --rm -it \
     -v ~/.ssh:/root/.ssh:ro \
     -v $PWD:/vuls \
     -v $PWD/vuls-log:/var/log/vuls \
     -v /etc/localtime:/etc/localtime:ro \
     -e "TZ=Asia/Tokyo" \
     vuls/vuls scan \
     -config=./config.toml # path to config.toml in docker</pre>
<p style="text-align: justify;">If Docker host is Debian or Ubuntu:</p>
<pre class="wp-block-preformatted">$ docker run --rm -it \
     -v ~/.ssh:/root/.ssh:ro \
     -v $PWD:/vuls \
     -v $PWD/vuls-log:/var/log/vuls \
     -v /etc/localtime:/etc/localtime:ro \
     -v /etc/timezone:/etc/timezone:ro \
     vuls/vuls scan \
     -config=./config.toml # path to config.toml in docker</pre>
<div class="row justify-content-center mb-3">
<div class="col-lg-4" style="text-align: justify;">Download <a href="https://github.com/future-architect/vuls">Vuls</a></div>
</div>
</div>
</div>
<p>The post <a href="http://kostacipo.stream/vuls-vulnerability-scanner/">Vuls &#8211; Vulnerability Scanner</a> appeared first on <a href="http://kostacipo.stream">Tech Chronicles</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>http://kostacipo.stream/vuls-vulnerability-scanner/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
