SlideShare a Scribd company logo
1 of 23
RAWR
Rapid Assessment of Web Resources
https://www.bitbucket.org/al14s/rawr
INTRODUCTION
Adam Byers [@al14s]
Started with BASIC – Antic mag… the ‘Blue Pages’

•
•
•
•

Blue Team
Automation
Wireless
Malware forensics

Tom Moore [@c0ncealed]
AOL proggies/punters in the 90’s
• Red Team Menace
• Loves creating reports
• Cuddles his AK
AGENDA

•
•
•
•
•

Web Assessments
Meet RAWR
Demo
Plans for the Future
Conclusion/Discussion
WHY WORRY ABOUT WEB?
If you don’t know your organizations web attack
surface, expect that someone else already does.
One of the highest threats to organizations today is also one of their
most prevalent services available in most cases, web interfaces. The
landscape has changed from simple static websites, to fully functional
web-based applications that provide access to internal information gold
mines.
Our belief is that most organizations have little to no knowledge as to
how many internal web resources they have within their environments
that could lead to network compromise. By taking an approach to ensure
the security of your client’s web interfaces through offensive security, you
will find that there is a lot involved – and usually not a lot of time to get
from initial scan to report.
WHAT WOULD YOU DO?
You are given the following objective:
 Assess your organization’s internal and
external web-based attack surface.
 Your end goal is to produce a report that
can be provided to both technical
individuals and executives.
WHICH TOOLS TO LEVERAGE?
Different tools for each step in the process:
 Recon
 Mapping
 Discovery
 Exploitation
 Reporting
These tools, in most cases do not produce output
that play nicely with one another.
This leaves YOU with the responsibility of
interfacing between them…
HOW WOULD YOU PRESENT IT?
How much work would be involved in obtaining
output that could be considered acceptable for
both of your intended audiences?
 Executive
 Technical

.

- Visuals and numbers.

- Specific information for remediation.

.

.
.
WHAT IS YOUR TURN-AROUND?
How long would it take you to go from initial
mapping, to producing the deliverable?
 Mapping
 Formatting data
 Identify targets of interest
 Additional information collection

 Formatting data (again)
 Validation of findings
 Composing the report
WHYUASKSOMANYQUESTION?
So, what really is the answer to this flurry of
questions?
 I’m glad you asked. =P
MEET…
WEB ASSESSMENTS

Recon
Mapping
Discovery
Exploitation
Reporting

RAWR
INPUT

•
•
•
•
•
•
•
•
•

NMap XML (live or from file) *
Nexpose Simple XML
Nexpose XML (v1,v2)
Nessus XML (.nessus) *
OpenVAS XML
Qualys XML (Scan Report) *
Qualys CSV (Port/Services Scan)
Metasploit CSV
??? CSV
* Parses SSL cert info for these
ENUMERATION
Default Passwords
Geo-location

INPUT

Extract as much as possible from the
server response.

Crawl
Modules
Bing DNS
OUTPUT

INPUT

ENUM

•
•
•
•
•
•
•
•
•
•

HTML
CSV
Attack Surface Matrix
SQLite3 db
Site Diagrams
JSON objects
NMap -oA (from live scan)
Cookies
Robots.txt
SSL Certificates
WEB ASSESSMENTS

Recon
Mapping
Discovery
Exploitation
Reporting

RAWR
error.log
ERRORS
RAWR IN ACTION
RAWR INSTALL

RAWR IN ACTION
RAWR SCAN

RAWR IN ACTION
PYTHON DOESN’T KILL…

…inefficiency kills
Your time is important.
Learn by doing…
no matter how small the task.
PLANS FOR THE FUTURE

• HTML appearance
• SSL parser testing
• Talk to:
•
•
•
•

Malware Researchers
Pentesters
Developers
SysAdmins
CONCLUSION / DISCUSSION
Comments, praise, questions, cash donations:
Adam [ al14s@pdrcorps.com ]
Enraged hate mail, insults, threats:
Tom [ c0ncealedx64@gmail.com ]

Thank you for sitting in - we hope you found our talk worthwhile.
If not, it’s all Tom’s fault.

More Related Content

Viewers also liked

Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Tom Moore
 
What is a book sprint?-
What is a book sprint?-What is a book sprint?-
What is a book sprint?-Hajni Virág
 
"Gaya dan pengaruhnya serta pesawat sederhana"
"Gaya dan pengaruhnya serta pesawat sederhana""Gaya dan pengaruhnya serta pesawat sederhana"
"Gaya dan pengaruhnya serta pesawat sederhana"umink
 
Atrapa Pintores - Wallame
Atrapa Pintores - WallameAtrapa Pintores - Wallame
Atrapa Pintores - Wallamebibliobrozos
 
Libro de descubridores
Libro de descubridores Libro de descubridores
Libro de descubridores bibliobrozos
 
Descubriendo a Mondrian - Editorial Weeble
Descubriendo a Mondrian - Editorial WeebleDescubriendo a Mondrian - Editorial Weeble
Descubriendo a Mondrian - Editorial Weeblebibliobrozos
 
Explorando mundos
Explorando mundos Explorando mundos
Explorando mundos bibliobrozos
 
Metode Simplek Minimasi
Metode Simplek MinimasiMetode Simplek Minimasi
Metode Simplek MinimasiSiti Zuariyah
 

Viewers also liked (10)

Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
Step On In, The Water's Fine! - An Introduction To Security Testing Within A ...
 
What is a book sprint?-
What is a book sprint?-What is a book sprint?-
What is a book sprint?-
 
"Gaya dan pengaruhnya serta pesawat sederhana"
"Gaya dan pengaruhnya serta pesawat sederhana""Gaya dan pengaruhnya serta pesawat sederhana"
"Gaya dan pengaruhnya serta pesawat sederhana"
 
Atrapa Pintores - Wallame
Atrapa Pintores - WallameAtrapa Pintores - Wallame
Atrapa Pintores - Wallame
 
pengantar bisnis
pengantar bisnispengantar bisnis
pengantar bisnis
 
Libro de descubridores
Libro de descubridores Libro de descubridores
Libro de descubridores
 
Descubriendo a Mondrian - Editorial Weeble
Descubriendo a Mondrian - Editorial WeebleDescubriendo a Mondrian - Editorial Weeble
Descubriendo a Mondrian - Editorial Weeble
 
Explorando mundos
Explorando mundos Explorando mundos
Explorando mundos
 
Metode Simplek Minimasi
Metode Simplek MinimasiMetode Simplek Minimasi
Metode Simplek Minimasi
 

Similar to Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0

11 Ways Microservices & Dynamic Clouds Break Your Monitoring
11 Ways Microservices & Dynamic Clouds Break Your Monitoring11 Ways Microservices & Dynamic Clouds Break Your Monitoring
11 Ways Microservices & Dynamic Clouds Break Your MonitoringAbner Germanow
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservicedevopsdaysaustin
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0Dinis Cruz
 
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"Daniel Bryant
 
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve PooleDevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve PooleJAXLondon_Conference
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software SecuritydevObjective
 
Starting Your DevOps Journey – Practical Tips for Ops
Starting Your DevOps Journey – Practical Tips for OpsStarting Your DevOps Journey – Practical Tips for Ops
Starting Your DevOps Journey – Practical Tips for OpsDynatrace
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkSplunk
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk Splunk
 
Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4jM. David Allen
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome
 
Apache Spark Streaming -Real time web server log analytics
Apache Spark Streaming -Real time web server log analyticsApache Spark Streaming -Real time web server log analytics
Apache Spark Streaming -Real time web server log analyticsANKIT GUPTA
 
Data Driven DevOps: from Culture to Gamification
Data Driven DevOps: from Culture to GamificationData Driven DevOps: from Culture to Gamification
Data Driven DevOps: from Culture to GamificationBrian McCallion
 
Design and Develop Serverless Applications as Set-Pieces
Design and Develop Serverless Applications as Set-PiecesDesign and Develop Serverless Applications as Set-Pieces
Design and Develop Serverless Applications as Set-PiecesSheenBrisals
 
10/ EnterpriseDB @ OPEN'16
10/ EnterpriseDB @ OPEN'16 10/ EnterpriseDB @ OPEN'16
10/ EnterpriseDB @ OPEN'16 Kangaroot
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT ForumDeirdre Curran
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台Mike Chang
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - finalAndrew White
 

Similar to Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0 (20)

11 Ways Microservices & Dynamic Clouds Break Your Monitoring
11 Ways Microservices & Dynamic Clouds Break Your Monitoring11 Ways Microservices & Dynamic Clouds Break Your Monitoring
11 Ways Microservices & Dynamic Clouds Break Your Monitoring
 
2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice2016 - 10 questions you should answer before building a new microservice
2016 - 10 questions you should answer before building a new microservice
 
New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0New Era of Software with modern Application Security v1.0
New Era of Software with modern Application Security v1.0
 
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
JAXLondon 2015 "DevOps and the Cloud: All Hail the (Developer) King"
 
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve PooleDevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
DevOps and the cloud: all hail the (developer) king - Daniel Bryant, Steve Poole
 
Who owns Software Security
Who owns Software SecurityWho owns Software Security
Who owns Software Security
 
Who Owns Software Security?
Who Owns Software Security?Who Owns Software Security?
Who Owns Software Security?
 
Starting Your DevOps Journey – Practical Tips for Ops
Starting Your DevOps Journey – Practical Tips for OpsStarting Your DevOps Journey – Practical Tips for Ops
Starting Your DevOps Journey – Practical Tips for Ops
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in SplunkHow to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
 
How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk How to Design, Build and Map IT and Business Services in Splunk
How to Design, Build and Map IT and Business Services in Splunk
 
Family tree of data – provenance and neo4j
Family tree of data – provenance and neo4jFamily tree of data – provenance and neo4j
Family tree of data – provenance and neo4j
 
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
DataDome's winning deck for 2019 FIC (Cybersecurity International Forum) "Pri...
 
What is web scraping?
What is web scraping?What is web scraping?
What is web scraping?
 
Apache Spark Streaming -Real time web server log analytics
Apache Spark Streaming -Real time web server log analyticsApache Spark Streaming -Real time web server log analytics
Apache Spark Streaming -Real time web server log analytics
 
Data Driven DevOps: from Culture to Gamification
Data Driven DevOps: from Culture to GamificationData Driven DevOps: from Culture to Gamification
Data Driven DevOps: from Culture to Gamification
 
Design and Develop Serverless Applications as Set-Pieces
Design and Develop Serverless Applications as Set-PiecesDesign and Develop Serverless Applications as Set-Pieces
Design and Develop Serverless Applications as Set-Pieces
 
10/ EnterpriseDB @ OPEN'16
10/ EnterpriseDB @ OPEN'16 10/ EnterpriseDB @ OPEN'16
10/ EnterpriseDB @ OPEN'16
 
2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum2016 IBM Watson IoT Forum
2016 IBM Watson IoT Forum
 
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
2016 ibm watson io t forum 躍升雲端 敏捷打造物聯網平台
 
Brighttalk understanding the promise of sde - final
Brighttalk   understanding the promise of sde - finalBrighttalk   understanding the promise of sde - final
Brighttalk understanding the promise of sde - final
 

Recently uploaded

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 

Recently uploaded (20)

A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 

Rapid Assessment of Web Resources (RAWR) - DerbyCon 3.0

  • 1. RAWR Rapid Assessment of Web Resources https://www.bitbucket.org/al14s/rawr
  • 2. INTRODUCTION Adam Byers [@al14s] Started with BASIC – Antic mag… the ‘Blue Pages’ • • • • Blue Team Automation Wireless Malware forensics Tom Moore [@c0ncealed] AOL proggies/punters in the 90’s • Red Team Menace • Loves creating reports • Cuddles his AK
  • 4. WHY WORRY ABOUT WEB? If you don’t know your organizations web attack surface, expect that someone else already does. One of the highest threats to organizations today is also one of their most prevalent services available in most cases, web interfaces. The landscape has changed from simple static websites, to fully functional web-based applications that provide access to internal information gold mines. Our belief is that most organizations have little to no knowledge as to how many internal web resources they have within their environments that could lead to network compromise. By taking an approach to ensure the security of your client’s web interfaces through offensive security, you will find that there is a lot involved – and usually not a lot of time to get from initial scan to report.
  • 5. WHAT WOULD YOU DO? You are given the following objective:  Assess your organization’s internal and external web-based attack surface.  Your end goal is to produce a report that can be provided to both technical individuals and executives.
  • 6. WHICH TOOLS TO LEVERAGE? Different tools for each step in the process:  Recon  Mapping  Discovery  Exploitation  Reporting These tools, in most cases do not produce output that play nicely with one another. This leaves YOU with the responsibility of interfacing between them…
  • 7. HOW WOULD YOU PRESENT IT? How much work would be involved in obtaining output that could be considered acceptable for both of your intended audiences?  Executive  Technical . - Visuals and numbers. - Specific information for remediation. . . .
  • 8. WHAT IS YOUR TURN-AROUND? How long would it take you to go from initial mapping, to producing the deliverable?  Mapping  Formatting data  Identify targets of interest  Additional information collection  Formatting data (again)  Validation of findings  Composing the report
  • 9. WHYUASKSOMANYQUESTION? So, what really is the answer to this flurry of questions?  I’m glad you asked. =P
  • 12. INPUT • • • • • • • • • NMap XML (live or from file) * Nexpose Simple XML Nexpose XML (v1,v2) Nessus XML (.nessus) * OpenVAS XML Qualys XML (Scan Report) * Qualys CSV (Port/Services Scan) Metasploit CSV ??? CSV * Parses SSL cert info for these
  • 13. ENUMERATION Default Passwords Geo-location INPUT Extract as much as possible from the server response. Crawl Modules Bing DNS
  • 14. OUTPUT INPUT ENUM • • • • • • • • • • HTML CSV Attack Surface Matrix SQLite3 db Site Diagrams JSON objects NMap -oA (from live scan) Cookies Robots.txt SSL Certificates
  • 21. PYTHON DOESN’T KILL… …inefficiency kills Your time is important. Learn by doing… no matter how small the task.
  • 22. PLANS FOR THE FUTURE • HTML appearance • SSL parser testing • Talk to: • • • • Malware Researchers Pentesters Developers SysAdmins
  • 23. CONCLUSION / DISCUSSION Comments, praise, questions, cash donations: Adam [ al14s@pdrcorps.com ] Enraged hate mail, insults, threats: Tom [ c0ncealedx64@gmail.com ] Thank you for sitting in - we hope you found our talk worthwhile. If not, it’s all Tom’s fault.

Editor's Notes

  1. I know this isn’t a comicon, but we’re going to do a little role playingYou’re in a medium to large business. How many web interfaces? Approximately 4000 web interfaces.
  2. I know this isn’t a comicon, but we’re going to do a little role playingYou’re in a medium to large business. How many web interfaces? Approximately 4000 web interfaces.
  3. For the purpose of this talk, we are not going to go in-depth on which tools to utilize, but rather focus on the stop gaps that exist between them.
  4. Which of the tools listed previously provide any information suitable for viewing by an executive?Not only this, but another consideration is how many times would you have to scan the network or re-query services to obtain information for both levels?What kind of visuals could we leverage? Screenshots / Site MapsWhat kind of numbers? Total services within the environment. Total number of systems not fitting the Minimum Security Baseline?What kind of technical information could we leverage? Query all the things! NMAP Results, CSV, Attack Surface Matrix, much much more…
  5. Each step in the process is time consuming, especially when dealing with a lot of information.Mapping of a large environment can take days. Network segmentation. Obfuscated ports. Latency.Once you scan, now you need to format all of your mapping information… Make them play nice!What items in your mapping process bubble to the top? Vulnerable targets? Admin Panels / Sharepoint Sites / Internal Services (HR / FIN / LGL) / Configuration pages / Directory BrowsingDo we now need to collect more information on these targets? Services vulnerable? Screenshots? Site Maps? SSL Certificates? Robots.txt? Cookies?Now we get to format again… Now for pulling together all of that data that shows that we truly did find dirt.And lastly, my favorite, composing that report that helps us justify our existence. ALL OF THIS TAKES TIME / Exponentially based on the amount of active web services that we find.
  6. Adam’s turn…
  7. dynamic CSV – working on a way to make this dynamic by checking the content (seems like a good challenge)Limited testing pool for some of them, so please shoot me any parsing issues you have. I’m not interested in anyone else’s information, but would like to fix any problems that arise within RAWR.
  8. Defpass file will grow as we add to the compilation
  9. SOMEWHERE DOWN THE ROAD, WE’LL HAVE A PROBLEM.We can run into issues PARSING, REQUESTING, etc.Using python’s traceback module to give meaningful, discrete feedback on errors.
  10. Every site is different, and even more likely if you’re working with external sites.I’ve done quite a bit to prevent an error from killing the thread.Error.log will hold all of your trace information.Makes it easy to troubleshoot or sanitize and send to the author so he can fix his mistake.. Now on to the demo……..
  11. We’ll see how to use RAWR in an actual web assessment…
  12. We’ll see how to use RAWR in an actual web assessment…
  13. We’ll see how to use RAWR in an actual web assessment…
  14. PyCharmTom’s picking up python, (WEPT class)Coders? Use the knowledge of the more experienced guys – let them point out the need. Then make it happen.The people that I know doing web assessments has been required to at least write one script in the exploitation phase of the analysis (validation of a weakness, non-cookie cutter)
  15. Beautify the HTMLWork out the SSL parsingTalk to the malware researchersTalk to the pentestersTalk to the developers
  16. Did anyone get the 90’s movie ref?