Security

Security Software & Tools Tips – October 2018

In this monthly post we try to make you aware of five different security related products.

This month we have choosen for the following:
* Hiawatha
* Shodan
* GRR
* Cloudfail
* AbuseIO

Hiawatha


Hiawatha is a cool lightweight webserver that has a very easy syntax to configure it.
the maker of Hiawatha has writtent the webserver with security in mind so it provides out of the box support for stopping SQL injections, XSS and CSRF attacks and exploit attempts.
We think Hiawatha is a great secure alternative for Apache or Nginx.

From the Hiawatha website:

Hiawatha is an open source webserver with a focus on security. I started Hiawatha in January 2002. Before that time, I had used several webservers, but I didn’t like them. They had unlogical, almost cryptic configuration syntax and none of them gave me a good feeling about their security and robustness. So, I decided it was time to write my own webserver. I never thought that my webserver would become what it is today, but I enjoyed working on it and liked to have my own open source project. In the years that followed, Hiawatha became a fully functional webserver.

Website:

https://www.hiawatha-webserver.org/

Shodan


Shodan is a website where you can scan internet connected devices for open services, this is a great tool to find out if your
organization has any services exposed to the internet that might be a security risk..

From wiki:

Shodan is a search engine that lets the user find specific types of computers connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are metadata that the server sends back to the client.

Website:

https://www.shodan.io/

GRR


GRR (Rapid Response)framework is a server client software that allows you to do live forensics on remote servers.

From their website:

GRR Rapid Response is an incident response framework focused on remote live forensics.
The goal of GRR is to support forensics and investigations in a fast, scalable manner to allow analysts to quickly triage attacks and perform analysis remotely.

Website:

https://github.com/google/grr

Cloudfail

From their website:

CloudFail is a tactical reconnaissance tool which aims to gather enough information about a target protected by Cloudflare in the hopes of discovering the location of the server. Using Tor to mask all requests, the tool as of right now has 3 different attack phases.

* Misconfigured DNS scan using DNSDumpster.
* Scan the Crimeflare database.
* Bruteforce scan over 2500 subdomains.

Website:

https://github.com/m0rtem/CloudFail

AbuseIO


This piece of software gives you a web interface that imports most important feeds such as shadowserver and spamcop, you can then see this information in a easy and relevant way.
This is a great tool to automate and improve the abuse handling process.

From their website:

It is a toolkit anyone can use to receive, process, correlate abuse reports and send notifications with specific information regarding the abuse case(s) on your network. AbuseIO’s purpose is to consolidate efforts by various companies and individuals to automate and improve the abuse handling process.

Website:

https://abuse.io/download/

Photo by Liam Tucker on Unsplash

Related posts

Internet of Medical Things: When Hacking becomes Life Threatening

Sjir Bagmeijer

Security Software & Tools Tips – December 2018

Sjir Bagmeijer

What GDPR means to cloud service providers

Sjir Bagmeijer