Linux Rootkits Hard to Detect

First of all what is a rootkit? A collection of software that runs and tries to hide from the computer user and administrator while also allowing the attacker access to the computer. It does this by connecting as ‘root’ to the Operating System kernel.  In Linux ‘root’ is the administrator. If you can masquerade as … Read more

How About Adversary Based Threat Analysis?

Another Thotcon presentation was very good, unique and moves the industry forward. Julian Cohen presented This idea: “Understanding Your Adversaries” In his talk: “Adversary-Based Threat Analysis” He explained that in the traditional Threat modeling Process  the following 6 items happen. Identify Assets Create Architecture Overview Decompose an Application Identity the Threats Document the Threats Rate … Read more

Windows10 Obsolete already?

Is your Windows10 version obsolete already?  there are many versions of Windows10 and it depends on when it was released, example – the first one version 1507 released July 2015 has a end of service date of May 9, 2017. The problem is every software manufacturer  Can’t or doesn’t keep releasing  vulnerability updates forever. The … Read more

Headless OpenVAS install

I needed to run OpenVAS (OpenVAS stands for Open Vulnerability Assessment System) the Linux based vulnerability management software on a virtual machine, which means it does not have its own monitor that one sits at to see this screen: OpenVAS is made by Greenbone, “which develops OpenVAS as part of their commercial vulnerability management product … Read more

Vulnerability Management Fixed!

So that we are all on the same page -Vulnerability Management is when an IT department manages it’s inventory of devices with regard to what vulnerabilities each device could be at risk for. So if every system you own has a vulnerability, and you have 1000 systems it could get a bit challenging to manage. … Read more