SlideShare a Scribd company logo
Vulnerability intelligence
with vulners
Igor Bulatenko
#:whoami
- vulners.com co-founder
- QIWI Group Security expert
- Web penetration tester
- Ex-security developer
- JBFC community participant
#:groups
- QIWI Security Team
- Kirill “isox” Ermakov (core)
- Igor “videns” Bulatenko (search)
- Ivan “vankyver” Yolkin (frontend)
- Alex “plex” Sekretov (parsers)
- Alex Leonov (Analytics)
Vulnerabilities are the gateways
by which threats are manifested
SANS institute
Vulnerable
- Vulnerability - weakness which allows an attacker to reduce a
system's information assurance (Wiki)
- Some kind of information that represents security issues
- Format-free description of function f(object, conditions) returning
True/False
Captain Obvious: Risks
- Information systems takeover
- Revocation of the licenses
- Business continuity
- Money loss
- …and a lot of other bad things
Vulnerability management process
- Mandatory component of information security
- Need2be for a security-aware companies
- Necessary to perform in accordance with the PCIDSS and others
- Best practice for survival in the Internet
Quite easy overview
Content sources fail
- Every product has it’s own source of vulnerability data
- Most information is not acceptable for automatic vulnerability scanners
- MITRE, NVD, SCAP, OVAL and others failed to standardize it
- Everyone is working on their own
- “Search”? Forget about it. Use Google instead.
Vendors are so cool
- Human only readable format
- Advisories instead of criteria
- Differs from page to page
- CSS wasn’t discovered yet
- HTML actually too
Classics of vulnerability awareness
- Security mailing lists
- “Let’s talk about…”
- Full of references and links
- Guess the syntax
Vulnerability assessment
- Vulnerability Scanners
- Developed in 90th
- Heavy deployment process
- About 20-30 different vendors
Under the hood of the typical scanner
- Scripting engine
- PHP/Python/PAZL/NASL
- Vulnerability checks
- Hidden logic of detection
The Good, the Bad and the Ugly
- Slow in big enterprises
- Binary scripts
- Missing central management
- Agentless technology requiring rootprivileges
- Inventory != vulnerability scan
- Good model was designed years ago
Feature racing
- Black magic challenge of collecting data
- More checks = better scanner
- Harmless pentest. ORLY?
- Do you trust your security vendor?
Scanner check delay
OPS style security
- Inventory is already done. No need to do it again.
- You already have a dashboard
- Targeted utilities acts better
- Version range checks
Let’s start from the scratch
- Established at 2015 by QIWI Security Team
- Parsing and data collection framework
- Built by security engineers for OPS
- The only check to do: version range
- Clear scanning process
vulners.com: Information security “Google”
- Vulnerability source data aggregator
- Created by security specialists for security specialists
- Incredibly fast search engine
- Normalized, machine-readable content
- Audit features out-of-the-box
- API-driven development
Content
- Vendor security advisories
- Exploit databases
- Security scanners plugins and modules
- Bug bounty programs
- Informational resources
- 0 days from security scanners
- … 60+ different sources and growing
Normalization. We did it!
- All data has unified model
- Perfect for integration
- Security scanners ready
- Automatic updateable content
- Analytics welcome
Coverage? One of the largest security DB’s
Search
- Google-style search string
- Dorks, advanced queries and many more
- UX-driven
- Human-oriented
- References and data linkage
- Extremely fast
Power of the aggregation
- Unified model in database
- Ability to perform correlation
- Security scanners comparison
- Reveal trends
API
- REST/JSON
- Integration focused scan features
- Audit calls for self-made
security scanners
- Easy expandable
- Content sharing features
Advanced queries
- Any complex query
- title:httpd type:centos order:published last 15 days cvss.score:[7 TO 10]
- Sortable by any field of the model (type, CVSS, dates, reporter, etc)
- Apache Lucene syntax (AND, OR and so on)
- Exploit search by sources and CVE’s
- cvelist:CVE-2014-0160 type:exploitdb
- sourceData:.bash_profile
- sourceData:"magic bytes”
Awareness as it should be
- Inspired by Google Search subscriptions
- Get the only content that you need
- Query based subscription
- Any delivery method:
- RSS
- Email
- Telegram
- API
RSS
- Fully customizable news feed in RSS format
- Powered by Apache Lucene query
- https://vulners.com/rss.xml?query=type:debian
- Updates-on-demand. No cache, it builds right when you ask it to.
- Atom, Webfeeds, mrss compatible
Email subscriptions
- Awareness service
- Absolutely customizable
Telegram news bot
- Up to 3 subscriptions for user
- In-app search
- Broadcast for emergency news
But…what about the scanner?
- Security scanner as a service
- Ready for Zabbix, Nagios, etc integration
- As simple as ”rpm –qa”
- Clear decision making logic
Package version scanning
- Perform only host inventory
- Can be done manually
- Don’t need root privileges
- Vendors data provided in a compatible format
Security audit
- Linux OS vulnerability scan
- Immediate results
- Dramatically simple
Security audit API
- Easy to use: Just give us output of package manager
- https://vulners.com/api/v3/audit/rpm/?os=centos&version=5&package=php-4.6.17-
1.el5.remi-x86_64
- JSON result
- Vulnerabilities list
- Reason of the decision
- References list (exploits, and so on)
- Ready to go for Red Hat and Debian family
- Typical call time for 500+ packages list = 160ms
- It’s fast. Really fast.
Security audit API
Home made scanner
- Available at GitHub
- Example of integration
- Free to fork
It is absolutely free
- Free for commercial and enterprise use
- Make your own solutions using our powers:
- Security scanners
- Threat intelligence
- Subscriptions
- Security automation
- Just please, post references if you can 
Thanks
- videns@vulners.com
- https://github.com/videns/vulners-scanner/
- We are really trying to make this world better
- Stop paying for features which are available for free

More Related Content

PPTX
Масштабируя TLS / Артём Гавриченков (Qrator Labs)
PDF
Testing applications with traffic control in containers / Alban Crequy (Kinvolk)
PDF
HTTP For the Good or the Bad
PDF
DAST в CI/CD, Ольга Свиридова
PDF
Dynamic Database Credentials: Security Contingency Planning
PPTX
Vault - Secret and Key Management
PDF
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
KEY
Deploying Plack Web Applications: OSCON 2011
Масштабируя TLS / Артём Гавриченков (Qrator Labs)
Testing applications with traffic control in containers / Alban Crequy (Kinvolk)
HTTP For the Good or the Bad
DAST в CI/CD, Ольга Свиридова
Dynamic Database Credentials: Security Contingency Planning
Vault - Secret and Key Management
Chickens & Eggs: Managing secrets in AWS with Hashicorp Vault
Deploying Plack Web Applications: OSCON 2011

What's hot (20)

PDF
Csp and http headers
PPTX
OWASP ZAP Workshop for QA Testers
PDF
HashiCorp Vault Workshop:幫 Credentials 找個窩
PPTX
Hashicorp Vault ppt
PDF
Security and Privacy on the Web in 2015
PPTX
ModSecurity 3.0 and NGINX: Getting Started - EMEA
PDF
Modern tooling to assist with developing applications on FreeBSD
PDF
Issuing temporary credentials for my sql using hashicorp vault
PDF
Altitude SF 2017: Logging at the edge
PDF
Keybase Vault Auto-Unseal HashiTalks2020
PDF
Consul First Steps
PDF
vert.x 소개 및 개발 실습
PDF
Web前端性能优化 2014
PDF
[OPD 2019] Attacking JWT tokens
PDF
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
PPTX
Rate Limiting with NGINX and NGINX Plus
PPTX
I See You
PDF
Rails Caching Secrets from the Edge
PDF
Nessus and Reporting Karma
PDF
Nginx - The webserver you might actually like
Csp and http headers
OWASP ZAP Workshop for QA Testers
HashiCorp Vault Workshop:幫 Credentials 找個窩
Hashicorp Vault ppt
Security and Privacy on the Web in 2015
ModSecurity 3.0 and NGINX: Getting Started - EMEA
Modern tooling to assist with developing applications on FreeBSD
Issuing temporary credentials for my sql using hashicorp vault
Altitude SF 2017: Logging at the edge
Keybase Vault Auto-Unseal HashiTalks2020
Consul First Steps
vert.x 소개 및 개발 실습
Web前端性能优化 2014
[OPD 2019] Attacking JWT tokens
Neil Saunders (Beamly) - Securing your AWS Infrastructure with Hashicorp Vault
Rate Limiting with NGINX and NGINX Plus
I See You
Rails Caching Secrets from the Edge
Nessus and Reporting Karma
Nginx - The webserver you might actually like
Ad

Viewers also liked (20)

PPTX
Безопасность Node.js / Илья Вербицкий (Независимый консультант)
PDF
ClickHouse: очень быстро и очень удобно / Виктор Тарнавский, Алексей Миловидо...
PDF
Open Source SQL-базы данных вступили в эру миллионов запросов в секунду / Фед...
PDF
Отладка производительности приложения на Erlang / Максим Лапшин (Erlyvideo)
PDF
Archival Disc на смену Blu-ray: построение архивного хранилища на оптических ...
PPSX
Архитектура поиска в Booking.com / Иван Круглов (Booking.com)
PPTX
Архитектура хранения и отдачи фотографий в Badoo / Артем Денисов (Badoo)
PDF
Highload на GPU, опыт Vinci / Олег Илларионов (ВКонтакте)
PPTX
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
PPTX
Как мы готовим MySQL / Николай Королёв (Badoo)
PDF
Хайлоад и безопасность в мире DevOps: совместимы ли? / Юрий Колесов (security...
PDF
Измеряем энергопотребление с помощью Arduino / Алексей Лавренюк (Яндекс)
PPTX
Пайплайн машинного обучения на Apache Spark / Павел Клеменков (Rambler&Co)
PDF
История успеха Яндекс.Почты с PostgreSQL / Владимир Бородин (Яндекс)
PDF
Микросервисы: опыт использования в нагруженном проекте / Вадим Мадисон (М-Тех)
PDF
Порядок для скорости. Система структурирования фронтендовой части веб-приложе...
PDF
Инфраструктура распределенных приложений на nodejs / Станислав Гуменюк (Rambl...
PPTX
Сайт под управлением ERP или ERP под управлением сайта / Станислав Гоц (Lamod...
PDF
Sphinx 3.0 и RT-индексы на основном поиске Avito / Андрей Смирнов, Вячеслав К...
PDF
Hadoop: Code Injection, Distributed Fault Injection
Безопасность Node.js / Илья Вербицкий (Независимый консультант)
ClickHouse: очень быстро и очень удобно / Виктор Тарнавский, Алексей Миловидо...
Open Source SQL-базы данных вступили в эру миллионов запросов в секунду / Фед...
Отладка производительности приложения на Erlang / Максим Лапшин (Erlyvideo)
Archival Disc на смену Blu-ray: построение архивного хранилища на оптических ...
Архитектура поиска в Booking.com / Иван Круглов (Booking.com)
Архитектура хранения и отдачи фотографий в Badoo / Артем Денисов (Badoo)
Highload на GPU, опыт Vinci / Олег Илларионов (ВКонтакте)
Неочевидные детали при запуске HTTPS в OK.Ru / Андрей Домась (Одноклассники)
Как мы готовим MySQL / Николай Королёв (Badoo)
Хайлоад и безопасность в мире DevOps: совместимы ли? / Юрий Колесов (security...
Измеряем энергопотребление с помощью Arduino / Алексей Лавренюк (Яндекс)
Пайплайн машинного обучения на Apache Spark / Павел Клеменков (Rambler&Co)
История успеха Яндекс.Почты с PostgreSQL / Владимир Бородин (Яндекс)
Микросервисы: опыт использования в нагруженном проекте / Вадим Мадисон (М-Тех)
Порядок для скорости. Система структурирования фронтендовой части веб-приложе...
Инфраструктура распределенных приложений на nodejs / Станислав Гуменюк (Rambl...
Сайт под управлением ERP или ERP под управлением сайта / Станислав Гоц (Lamod...
Sphinx 3.0 и RT-индексы на основном поиске Avito / Андрей Смирнов, Вячеслав К...
Hadoop: Code Injection, Distributed Fault Injection
Ad

Similar to Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко (QIWI) (20)

PPTX
Vulnerability Intelligence and Assessment with vulners.com
PPTX
Why vulners? Short story about reinventing a wheel
PDF
Security awareness for information security team
PPTX
Serverless - minimizing the attack surface
PDF
Security Automation - Python - Introduction
PPTX
Using Splunk for Information Security
PPTX
Using Splunk for Information Security
PDF
Vulners: Google for hackers
PDF
Présentation SIEM SOC Operation Analysts Tools P1
PDF
CI / CD / CS - Continuous Security in Kubernetes
PPT
Starwest 2008
PDF
RIoT (Raiding Internet of Things) by Jacob Holcomb
PPT
Ending the Tyranny of Expensive Security Tools: A New Hope
PPTX
dependency-check is ppt from owasp to test dependecies
PDF
DevSecOps and the CI/CD Pipeline
PPTX
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
PDF
The DevSecOps Builder’s Guide to the CI/CD Pipeline
PDF
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
PDF
soctool.pdf
PPTX
Enterprise Sec + User Bahavior Analytics
Vulnerability Intelligence and Assessment with vulners.com
Why vulners? Short story about reinventing a wheel
Security awareness for information security team
Serverless - minimizing the attack surface
Security Automation - Python - Introduction
Using Splunk for Information Security
Using Splunk for Information Security
Vulners: Google for hackers
Présentation SIEM SOC Operation Analysts Tools P1
CI / CD / CS - Continuous Security in Kubernetes
Starwest 2008
RIoT (Raiding Internet of Things) by Jacob Holcomb
Ending the Tyranny of Expensive Security Tools: A New Hope
dependency-check is ppt from owasp to test dependecies
DevSecOps and the CI/CD Pipeline
OWASP AppSec EU - SecDevOps, a view from the trenches - Abhay Bhargav
The DevSecOps Builder’s Guide to the CI/CD Pipeline
Jaime Blasco - Fighting Advanced Persistent Threat (APT) with Open Source Too...
soctool.pdf
Enterprise Sec + User Bahavior Analytics

More from Ontico (20)

PDF
One-cloud — система управления дата-центром в Одноклассниках / Олег Анастасье...
PDF
Масштабируя DNS / Артем Гавриченков (Qrator Labs)
PPTX
Создание BigData-платформы для ФГУП Почта России / Андрей Бащенко (Luxoft)
PDF
Готовим тестовое окружение, или сколько тестовых инстансов вам нужно / Алекса...
PDF
Новые технологии репликации данных в PostgreSQL / Александр Алексеев (Postgre...
PDF
PostgreSQL Configuration for Humans / Alvaro Hernandez (OnGres)
PDF
Inexpensive Datamasking for MySQL with ProxySQL — Data Anonymization for Deve...
PDF
Опыт разработки модуля межсетевого экранирования для MySQL / Олег Брославский...
PPTX
ProxySQL Use Case Scenarios / Alkin Tezuysal (Percona)
PPTX
MySQL Replication — Advanced Features / Петр Зайцев (Percona)
PDF
Внутренний open-source. Как разрабатывать мобильное приложение большим количе...
PPTX
Подробно о том, как Causal Consistency реализовано в MongoDB / Михаил Тюленев...
PPTX
Балансировка на скорости проводов. Без ASIC, без ограничений. Решения NFWare ...
PDF
Перехват трафика — мифы и реальность / Евгений Усков (Qrator Labs)
PPT
И тогда наверняка вдруг запляшут облака! / Алексей Сушков (ПЕТЕР-СЕРВИС)
PPTX
Как мы заставили Druid работать в Одноклассниках / Юрий Невиницин (OK.RU)
PPTX
Разгоняем ASP.NET Core / Илья Вербицкий (WebStoating s.r.o.)
PPTX
100500 способов кэширования в Oracle Database или как достичь максимальной ск...
PPTX
Apache Ignite Persistence: зачем Persistence для In-Memory, и как он работает...
PDF
Механизмы мониторинга баз данных: взгляд изнутри / Дмитрий Еманов (Firebird P...
One-cloud — система управления дата-центром в Одноклассниках / Олег Анастасье...
Масштабируя DNS / Артем Гавриченков (Qrator Labs)
Создание BigData-платформы для ФГУП Почта России / Андрей Бащенко (Luxoft)
Готовим тестовое окружение, или сколько тестовых инстансов вам нужно / Алекса...
Новые технологии репликации данных в PostgreSQL / Александр Алексеев (Postgre...
PostgreSQL Configuration for Humans / Alvaro Hernandez (OnGres)
Inexpensive Datamasking for MySQL with ProxySQL — Data Anonymization for Deve...
Опыт разработки модуля межсетевого экранирования для MySQL / Олег Брославский...
ProxySQL Use Case Scenarios / Alkin Tezuysal (Percona)
MySQL Replication — Advanced Features / Петр Зайцев (Percona)
Внутренний open-source. Как разрабатывать мобильное приложение большим количе...
Подробно о том, как Causal Consistency реализовано в MongoDB / Михаил Тюленев...
Балансировка на скорости проводов. Без ASIC, без ограничений. Решения NFWare ...
Перехват трафика — мифы и реальность / Евгений Усков (Qrator Labs)
И тогда наверняка вдруг запляшут облака! / Алексей Сушков (ПЕТЕР-СЕРВИС)
Как мы заставили Druid работать в Одноклассниках / Юрий Невиницин (OK.RU)
Разгоняем ASP.NET Core / Илья Вербицкий (WebStoating s.r.o.)
100500 способов кэширования в Oracle Database или как достичь максимальной ск...
Apache Ignite Persistence: зачем Persistence для In-Memory, и как он работает...
Механизмы мониторинга баз данных: взгляд изнутри / Дмитрий Еманов (Firebird P...

Recently uploaded (20)

PPTX
web development for engineering and engineering
PDF
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
PPTX
additive manufacturing of ss316l using mig welding
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Automation-in-Manufacturing-Chapter-Introduction.pdf
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
Current and future trends in Computer Vision.pptx
PPT
Project quality management in manufacturing
PPTX
OOP with Java - Java Introduction (Basics)
PDF
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PDF
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
DOCX
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPT
Mechanical Engineering MATERIALS Selection
PPTX
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
PPTX
Safety Seminar civil to be ensured for safe working.
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
web development for engineering and engineering
keyrequirementskkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkkk
Model Code of Practice - Construction Work - 21102022 .pdf
Unit I ESSENTIAL OF DIGITAL MARKETING.pdf
additive manufacturing of ss316l using mig welding
UNIT 4 Total Quality Management .pptx
Automation-in-Manufacturing-Chapter-Introduction.pdf
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
R24 SURVEYING LAB MANUAL for civil enggi
Current and future trends in Computer Vision.pptx
Project quality management in manufacturing
OOP with Java - Java Introduction (Basics)
SM_6th-Sem__Cse_Internet-of-Things.pdf IOT
PRIZ Academy - 9 Windows Thinking Where to Invest Today to Win Tomorrow.pdf
ASol_English-Language-Literature-Set-1-27-02-2023-converted.docx
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
Mechanical Engineering MATERIALS Selection
MET 305 2019 SCHEME MODULE 2 COMPLETE.pptx
Safety Seminar civil to be ensured for safe working.
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx

Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко (QIWI)

  • 2. #:whoami - vulners.com co-founder - QIWI Group Security expert - Web penetration tester - Ex-security developer - JBFC community participant
  • 3. #:groups - QIWI Security Team - Kirill “isox” Ermakov (core) - Igor “videns” Bulatenko (search) - Ivan “vankyver” Yolkin (frontend) - Alex “plex” Sekretov (parsers) - Alex Leonov (Analytics)
  • 4. Vulnerabilities are the gateways by which threats are manifested SANS institute
  • 5. Vulnerable - Vulnerability - weakness which allows an attacker to reduce a system's information assurance (Wiki) - Some kind of information that represents security issues - Format-free description of function f(object, conditions) returning True/False
  • 6. Captain Obvious: Risks - Information systems takeover - Revocation of the licenses - Business continuity - Money loss - …and a lot of other bad things
  • 7. Vulnerability management process - Mandatory component of information security - Need2be for a security-aware companies - Necessary to perform in accordance with the PCIDSS and others - Best practice for survival in the Internet
  • 9. Content sources fail - Every product has it’s own source of vulnerability data - Most information is not acceptable for automatic vulnerability scanners - MITRE, NVD, SCAP, OVAL and others failed to standardize it - Everyone is working on their own - “Search”? Forget about it. Use Google instead.
  • 10. Vendors are so cool - Human only readable format - Advisories instead of criteria - Differs from page to page - CSS wasn’t discovered yet - HTML actually too
  • 11. Classics of vulnerability awareness - Security mailing lists - “Let’s talk about…” - Full of references and links - Guess the syntax
  • 12. Vulnerability assessment - Vulnerability Scanners - Developed in 90th - Heavy deployment process - About 20-30 different vendors
  • 13. Under the hood of the typical scanner - Scripting engine - PHP/Python/PAZL/NASL - Vulnerability checks - Hidden logic of detection
  • 14. The Good, the Bad and the Ugly - Slow in big enterprises - Binary scripts - Missing central management - Agentless technology requiring rootprivileges - Inventory != vulnerability scan - Good model was designed years ago
  • 15. Feature racing - Black magic challenge of collecting data - More checks = better scanner - Harmless pentest. ORLY? - Do you trust your security vendor?
  • 17. OPS style security - Inventory is already done. No need to do it again. - You already have a dashboard - Targeted utilities acts better - Version range checks
  • 18. Let’s start from the scratch - Established at 2015 by QIWI Security Team - Parsing and data collection framework - Built by security engineers for OPS - The only check to do: version range - Clear scanning process
  • 19. vulners.com: Information security “Google” - Vulnerability source data aggregator - Created by security specialists for security specialists - Incredibly fast search engine - Normalized, machine-readable content - Audit features out-of-the-box - API-driven development
  • 20. Content - Vendor security advisories - Exploit databases - Security scanners plugins and modules - Bug bounty programs - Informational resources - 0 days from security scanners - … 60+ different sources and growing
  • 21. Normalization. We did it! - All data has unified model - Perfect for integration - Security scanners ready - Automatic updateable content - Analytics welcome
  • 22. Coverage? One of the largest security DB’s
  • 23. Search - Google-style search string - Dorks, advanced queries and many more - UX-driven - Human-oriented - References and data linkage - Extremely fast
  • 24. Power of the aggregation - Unified model in database - Ability to perform correlation - Security scanners comparison - Reveal trends
  • 25. API - REST/JSON - Integration focused scan features - Audit calls for self-made security scanners - Easy expandable - Content sharing features
  • 26. Advanced queries - Any complex query - title:httpd type:centos order:published last 15 days cvss.score:[7 TO 10] - Sortable by any field of the model (type, CVSS, dates, reporter, etc) - Apache Lucene syntax (AND, OR and so on) - Exploit search by sources and CVE’s - cvelist:CVE-2014-0160 type:exploitdb - sourceData:.bash_profile - sourceData:"magic bytes”
  • 27. Awareness as it should be - Inspired by Google Search subscriptions - Get the only content that you need - Query based subscription - Any delivery method: - RSS - Email - Telegram - API
  • 28. RSS - Fully customizable news feed in RSS format - Powered by Apache Lucene query - https://vulners.com/rss.xml?query=type:debian - Updates-on-demand. No cache, it builds right when you ask it to. - Atom, Webfeeds, mrss compatible
  • 29. Email subscriptions - Awareness service - Absolutely customizable
  • 30. Telegram news bot - Up to 3 subscriptions for user - In-app search - Broadcast for emergency news
  • 31. But…what about the scanner? - Security scanner as a service - Ready for Zabbix, Nagios, etc integration - As simple as ”rpm –qa” - Clear decision making logic
  • 32. Package version scanning - Perform only host inventory - Can be done manually - Don’t need root privileges - Vendors data provided in a compatible format
  • 33. Security audit - Linux OS vulnerability scan - Immediate results - Dramatically simple
  • 34. Security audit API - Easy to use: Just give us output of package manager - https://vulners.com/api/v3/audit/rpm/?os=centos&version=5&package=php-4.6.17- 1.el5.remi-x86_64 - JSON result - Vulnerabilities list - Reason of the decision - References list (exploits, and so on) - Ready to go for Red Hat and Debian family - Typical call time for 500+ packages list = 160ms - It’s fast. Really fast.
  • 36. Home made scanner - Available at GitHub - Example of integration - Free to fork
  • 37. It is absolutely free - Free for commercial and enterprise use - Make your own solutions using our powers: - Security scanners - Threat intelligence - Subscriptions - Security automation - Just please, post references if you can 
  • 38. Thanks - videns@vulners.com - https://github.com/videns/vulners-scanner/ - We are really trying to make this world better - Stop paying for features which are available for free