Why vulners?
Short story about reinventing a wheel
Kirill Ermakov,
RISSPA, 2016
2
#:whoami
- vulners.com founder
- QIWI Group CTO
- Web penetration tester
- Member of “hall-of-fames” (Yandex, Mail.ru, Apple and so on)
- JBFC community participant
3
Vulnerable
- Vulnerability - weakness which allows an attacker to reduce a
system's information assurance (Wiki)
- Some kind of information that represents security issues
- Format-free description of function f(object, conditions)
returning True/False
4
Captain Obvious: Risks
- Information systems takeover
- Revocation of the licenses
- Business continuity
- Money loss
- …and a lot of other bad things
5
Vulnerability management process
- Mandatory component of information security
- Need2be for a security-aware companies
- Necessary to perform in accordance with the PCIDSS and
others
- Best practice for survival in the Internet
6
Quite easy overview
7
Content sources fail
- Born in 90’s
- Every product has it’s own source of vulnerability data
- Most information is not acceptable for automatic vulnerability
scanners
- MITRE, NVD, SCAP, OVAL and others failed to standardize it
- Everyone is working on their own
- “Search”? Forget about it. Use Google instead.
8
vulners.com: Information security
“Google”
- Vulnerability source data aggregator
- Created by security specialists for security specialists
- Incredibly fast search engine
- Normalized, machine-readable content
- Audit features out-of-the-box
- API-driven development
- Absolutely free
9
Content
- Vendor security advisories (CentOS, RedHat, Cisco, etc)
- Exploit databases (ExploitDB, 0dayToday, Vulnerability Lab)
- Security scanners plugins and modules (Metasploit, Nessus)
- Bug bounty programs (Hacker One, XSSed, Openbugbounty)
- Informational resources (Threatpost, Hacker forums)
- 0 days from security scanners (Appercut, HackApp)
- … 40+ different sources and growing
10
Normalization. We did it!
- All data has unified model
- Perfect for integration
- Security scanners ready
- Automatic updateable content
- Analytics welcome
11
Coverage? One of the largest security DB’s
12
Search
- Google-style search string
- Dorks, advanced queries and many more
- UX-driven
- Human-oriented
- References and data linkage
- Extremely fast
13
API
- REST/JSON
- Integration focused scan features
- Audit calls for self-made security scanners
- Easy expandable
- Content sharing features
14
Under the hood
15
Example: advanced queries
- Any complex query
- title:httpd type:centos order:published last 15 days
- Sortable by any field of the model (type, CVSS, dates, reporter,
etc)
- Apache Lucene syntax (AND, OR and so on)
- Exploit search by sources and CVE’s
- cvelist:CVE-2014-0160 type:exploitdb
- sourceData:.bash_profile
- sourceData:"magic bytes”
16
Example: API
- GET/POST REST API with JSON output
- Search
- https://vulners.com/api/v3/search/lucene/?query=type:cent
os%20cvss.score:[8%20TO%2010]%20order:published
- Information
- https://vulners.com/api/v3/search/id?id=CESA-
2016:1237&references=true
- Export
- https://vulners.com/api/v3/archive/collection?type=exploitd
b
17
Example: RSS
- Fully customizable news feed in RSS format
- Powered by lucene query
- https://vulners.com/rss.xml?query=type:debian
- Updates-on-demand. No cache, it builds right when you ask it
to.
- Atom, Webfeeds, mrss compatible
18
Example: Telegram news bot
- Up to 3 subscriptions for user
- In-app search
- Broadcast for emergency news
19
Example: Security audit
- Easy to use: Just give us output of package manager
- https://vulners.com/api/v3/audit/rpm/?os=centos&version=
5&package=php-4.6.17-1.el5.remi-x86_64
- JSON result
- Vulnerabilities list
- Reason of the decision
- References list (exploits, and so on)
- Ready to go for Red Hat family, beta-testing for Debian family
- Typical call time for 500+ packages list = 160ms
- It’s fast. Really fast.
20
Example: Security audit
21
It is absolutely free
- Free for commercial and enterprise use DB and API
- Make your own solutions using our powers:
- Security scanners
- Threat intelligence
- Subscriptions
- Security automation
- Just please, post references if you can 
22
Thanks
- isox@vulners.com
- We are really trying to make this world better
- Stop paying for features, that are available for free

More Related Content

PDF
Vulnerability Funalitics with vulners.com
PDF
Security awareness for information security team
PDF
Vulners: Google for hackers
PDF
Vulners report: comparing vulnerability world 2016 to 2017
PDF
10 things I’ve learnt about web application security
PPT
OWASP Serbia - A5 cross-site request forgery
PPTX
Web application Security tools
PPT
OWASP Serbia - A3 broken authentication and session management
Vulnerability Funalitics with vulners.com
Security awareness for information security team
Vulners: Google for hackers
Vulners report: comparing vulnerability world 2016 to 2017
10 things I’ve learnt about web application security
OWASP Serbia - A5 cross-site request forgery
Web application Security tools
OWASP Serbia - A3 broken authentication and session management

What's hot (20)

PDF
MR201504 Web Defacing Attacks Targeting WordPress
PPTX
Web tools ppt
PDF
[Cluj] CSP (Content Security Policy)
PPTX
Secure Programming In Php
PPTX
Open Source CMS : How secure are they?
PPT
OWASP Top10 2010
PPTX
A2 - broken authentication and session management(OWASP thailand chapter Apri...
PPTX
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
PDF
OWASP Top 10 2017
PDF
Web Development Security
PPTX
Securing the Web @DevDay Da Nang 2018
PPTX
Pci compliance writing secure code
PDF
Java EE 6 Security in practice with GlassFish
PPT
Starwest 2008
PPTX
2 . web app s canners
PPTX
OWASP Khartoum Top 10 A3 - 6th meeting
PDF
Beyond OWASP Top 10 - TASK October 2017
PPTX
4 . future uni presentation
PDF
OWASP TOP TEN 2017 RC1
PDF
OWASP TOP 10 & .NET
MR201504 Web Defacing Attacks Targeting WordPress
Web tools ppt
[Cluj] CSP (Content Security Policy)
Secure Programming In Php
Open Source CMS : How secure are they?
OWASP Top10 2010
A2 - broken authentication and session management(OWASP thailand chapter Apri...
[DevDay2018] Security Testing - By Thuy Nguyen, Software Engineer at Axon Act...
OWASP Top 10 2017
Web Development Security
Securing the Web @DevDay Da Nang 2018
Pci compliance writing secure code
Java EE 6 Security in practice with GlassFish
Starwest 2008
2 . web app s canners
OWASP Khartoum Top 10 A3 - 6th meeting
Beyond OWASP Top 10 - TASK October 2017
4 . future uni presentation
OWASP TOP TEN 2017 RC1
OWASP TOP 10 & .NET
Ad

Viewers also liked (18)

PDF
Nota pública em defesa da lei da ficha limpa
PPTX
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
PPT
Williamsburg Project
PPT
Plano de distribuição - Um ensaio
PDF
InfoWatch. Олег Коробейников. "Защита от внутренних угроз и таргетированных а...
PPTX
Sagar Kadam, Lead Software Engineer, Open-Silicon
PDF
Why every developer should read Plato
PDF
Proposta Renault Dialogue
PDF
presentation_sas2016_V3
PPTX
Dr. John Bainbridge, Principal Application Architect, NetSpeed
PDF
Исследование Viber Атакуем пользователя через популярный мессенджер (Игорь al...
PDF
Взлом Wi-Fi, теперь это мое! Теория и практические примеры по взлому Wi-Fi се...
PDF
Generate a Living Style Guide from CSS - CSSDevConf 2016
PPT
Benefits of web application firewalls
PPTX
Security in embedded systems
PPTX
PNAIC 2015 - Currículo na perspectiva da inclusão e da diversidade
PPTX
The Segment Routing Architecture (IEEE Globecom 2015)
PPTX
Miért fontos, hogy következetes legyen a felhasználói felületed?
Nota pública em defesa da lei da ficha limpa
Prof. Steve Furber, University of Manchester, Principal Designer of the BBC M...
Williamsburg Project
Plano de distribuição - Um ensaio
InfoWatch. Олег Коробейников. "Защита от внутренних угроз и таргетированных а...
Sagar Kadam, Lead Software Engineer, Open-Silicon
Why every developer should read Plato
Proposta Renault Dialogue
presentation_sas2016_V3
Dr. John Bainbridge, Principal Application Architect, NetSpeed
Исследование Viber Атакуем пользователя через популярный мессенджер (Игорь al...
Взлом Wi-Fi, теперь это мое! Теория и практические примеры по взлому Wi-Fi се...
Generate a Living Style Guide from CSS - CSSDevConf 2016
Benefits of web application firewalls
Security in embedded systems
PNAIC 2015 - Currículo na perspectiva da inclusão e da diversidade
The Segment Routing Architecture (IEEE Globecom 2015)
Miért fontos, hogy következetes legyen a felhasználói felületed?
Ad

Similar to Why vulners? Short story about reinventing a wheel (20)

PPTX
Vulnerability Intelligence and Assessment with vulners.com
PPTX
Detection of webshells in compromised perimeter assets using ML algorithms
PPTX
Vulnerability intelligence with vulners.com
PPTX
Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко...
PPTX
RSA Europe 2013 OWASP Training
PDF
technical-information-gathering-slides.pdf
PDF
4 andrii kudiurov - web application security 101
PPTX
Cyber Security and Open Source
PDF
Security in the cloud protecting your cloud apps
PPTX
[2.1] Web application Security Trends - Omar Ganiev
PPTX
Owasp web application security trends
PDF
Drupal Security Seminar
PPTX
Using Splunk for Information Security
PPTX
Using Splunk for Information Security
PPT
OWASP App Sec US - 2010
PPT
Secure SDLC for Software
PPTX
Automatically detecting security vulnerabilities in WordPress
PPTX
OWASP Free Training - SF2014 - Keary and Manico
PPT
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
PPTX
Open Security - Chad Cravens
Vulnerability Intelligence and Assessment with vulners.com
Detection of webshells in compromised perimeter assets using ML algorithms
Vulnerability intelligence with vulners.com
Vulnerability intelligence with vulners.com / Кирилл Ермаков, Игорь Булатенко...
RSA Europe 2013 OWASP Training
technical-information-gathering-slides.pdf
4 andrii kudiurov - web application security 101
Cyber Security and Open Source
Security in the cloud protecting your cloud apps
[2.1] Web application Security Trends - Omar Ganiev
Owasp web application security trends
Drupal Security Seminar
Using Splunk for Information Security
Using Splunk for Information Security
OWASP App Sec US - 2010
Secure SDLC for Software
Automatically detecting security vulnerabilities in WordPress
OWASP Free Training - SF2014 - Keary and Manico
Web 2.0 Application Kung-Fu - Securing Ajax & Web Services
Open Security - Chad Cravens

More from Kirill Ermakov (7)

PPTX
How to get a well done penetration test
PPTX
Под капотом Vulners
PPTX
SOC training
PPTX
Почему вам не нужен SOC
PPTX
Подход QIWI к проведению тестирования на проникновение
PPTX
Let’s play the game. Yet another way to perform penetration test. Russian “re...
PPTX
Lets talk about bug hunting
How to get a well done penetration test
Под капотом Vulners
SOC training
Почему вам не нужен SOC
Подход QIWI к проведению тестирования на проникновение
Let’s play the game. Yet another way to perform penetration test. Russian “re...
Lets talk about bug hunting

Recently uploaded (20)

PPTX
Computer Software - Technology and Livelihood Education
PDF
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
PPTX
Introduction to Windows Operating System
PDF
Types of Token_ From Utility to Security.pdf
PDF
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PPTX
Monitoring Stack: Grafana, Loki & Promtail
PDF
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
PDF
Autodesk AutoCAD Crack Free Download 2025
DOCX
How to Use SharePoint as an ISO-Compliant Document Management System
DOCX
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
PPTX
Weekly report ppt - harsh dattuprasad patel.pptx
PPTX
assetexplorer- product-overview - presentation
PDF
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
PPTX
Advanced SystemCare Ultimate Crack + Portable (2025)
PPTX
"Secure File Sharing Solutions on AWS".pptx
PDF
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
PDF
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
PDF
Cost to Outsource Software Development in 2025
PPTX
Cybersecurity: Protecting the Digital World
Computer Software - Technology and Livelihood Education
DuckDuckGo Private Browser Premium APK for Android Crack Latest 2025
Introduction to Windows Operating System
Types of Token_ From Utility to Security.pdf
Ableton Live Suite for MacOS Crack Full Download (Latest 2025)
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Monitoring Stack: Grafana, Loki & Promtail
How to Make Money in the Metaverse_ Top Strategies for Beginners.pdf
Autodesk AutoCAD Crack Free Download 2025
How to Use SharePoint as an ISO-Compliant Document Management System
Modern SharePoint Intranet Templates That Boost Employee Engagement in 2025.docx
Weekly report ppt - harsh dattuprasad patel.pptx
assetexplorer- product-overview - presentation
Product Update: Alluxio AI 3.7 Now with Sub-Millisecond Latency
Advanced SystemCare Ultimate Crack + Portable (2025)
"Secure File Sharing Solutions on AWS".pptx
Top 10 Software Development Trends to Watch in 2025 🚀.pdf
AI-Powered Threat Modeling: The Future of Cybersecurity by Arun Kumar Elengov...
Cost to Outsource Software Development in 2025
Cybersecurity: Protecting the Digital World

Why vulners? Short story about reinventing a wheel

  • 1. Why vulners? Short story about reinventing a wheel Kirill Ermakov, RISSPA, 2016
  • 2. 2 #:whoami - vulners.com founder - QIWI Group CTO - Web penetration tester - Member of “hall-of-fames” (Yandex, Mail.ru, Apple and so on) - JBFC community participant
  • 3. 3 Vulnerable - Vulnerability - weakness which allows an attacker to reduce a system's information assurance (Wiki) - Some kind of information that represents security issues - Format-free description of function f(object, conditions) returning True/False
  • 4. 4 Captain Obvious: Risks - Information systems takeover - Revocation of the licenses - Business continuity - Money loss - …and a lot of other bad things
  • 5. 5 Vulnerability management process - Mandatory component of information security - Need2be for a security-aware companies - Necessary to perform in accordance with the PCIDSS and others - Best practice for survival in the Internet
  • 7. 7 Content sources fail - Born in 90’s - Every product has it’s own source of vulnerability data - Most information is not acceptable for automatic vulnerability scanners - MITRE, NVD, SCAP, OVAL and others failed to standardize it - Everyone is working on their own - “Search”? Forget about it. Use Google instead.
  • 8. 8 vulners.com: Information security “Google” - Vulnerability source data aggregator - Created by security specialists for security specialists - Incredibly fast search engine - Normalized, machine-readable content - Audit features out-of-the-box - API-driven development - Absolutely free
  • 9. 9 Content - Vendor security advisories (CentOS, RedHat, Cisco, etc) - Exploit databases (ExploitDB, 0dayToday, Vulnerability Lab) - Security scanners plugins and modules (Metasploit, Nessus) - Bug bounty programs (Hacker One, XSSed, Openbugbounty) - Informational resources (Threatpost, Hacker forums) - 0 days from security scanners (Appercut, HackApp) - … 40+ different sources and growing
  • 10. 10 Normalization. We did it! - All data has unified model - Perfect for integration - Security scanners ready - Automatic updateable content - Analytics welcome
  • 11. 11 Coverage? One of the largest security DB’s
  • 12. 12 Search - Google-style search string - Dorks, advanced queries and many more - UX-driven - Human-oriented - References and data linkage - Extremely fast
  • 13. 13 API - REST/JSON - Integration focused scan features - Audit calls for self-made security scanners - Easy expandable - Content sharing features
  • 15. 15 Example: advanced queries - Any complex query - title:httpd type:centos order:published last 15 days - Sortable by any field of the model (type, CVSS, dates, reporter, etc) - Apache Lucene syntax (AND, OR and so on) - Exploit search by sources and CVE’s - cvelist:CVE-2014-0160 type:exploitdb - sourceData:.bash_profile - sourceData:"magic bytes”
  • 16. 16 Example: API - GET/POST REST API with JSON output - Search - https://vulners.com/api/v3/search/lucene/?query=type:cent os%20cvss.score:[8%20TO%2010]%20order:published - Information - https://vulners.com/api/v3/search/id?id=CESA- 2016:1237&references=true - Export - https://vulners.com/api/v3/archive/collection?type=exploitd b
  • 17. 17 Example: RSS - Fully customizable news feed in RSS format - Powered by lucene query - https://vulners.com/rss.xml?query=type:debian - Updates-on-demand. No cache, it builds right when you ask it to. - Atom, Webfeeds, mrss compatible
  • 18. 18 Example: Telegram news bot - Up to 3 subscriptions for user - In-app search - Broadcast for emergency news
  • 19. 19 Example: Security audit - Easy to use: Just give us output of package manager - https://vulners.com/api/v3/audit/rpm/?os=centos&version= 5&package=php-4.6.17-1.el5.remi-x86_64 - JSON result - Vulnerabilities list - Reason of the decision - References list (exploits, and so on) - Ready to go for Red Hat family, beta-testing for Debian family - Typical call time for 500+ packages list = 160ms - It’s fast. Really fast.
  • 21. 21 It is absolutely free - Free for commercial and enterprise use DB and API - Make your own solutions using our powers: - Security scanners - Threat intelligence - Subscriptions - Security automation - Just please, post references if you can 
  • 22. 22 Thanks - isox@vulners.com - We are really trying to make this world better - Stop paying for features, that are available for free