<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>infosec &#8211; davidonzo&#039;s blog</title>
	<atom:link href="https://www.davidonzo.com/category/infosec/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.davidonzo.com</link>
	<description>devi apparire ridicolo se vuoi essere preso sul serio</description>
	<lastBuildDate>Mon, 21 May 2018 13:58:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=5.4.10</generator>
	<item>
		<title>MISP &#8211; Malware Information Sharing Platform &#8211; Installazione</title>
		<link>https://www.davidonzo.com/2018/05/21/misp-malware-information-sharing-platform-installazione/</link>
					<comments>https://www.davidonzo.com/2018/05/21/misp-malware-information-sharing-platform-installazione/#respond</comments>
		
		<dc:creator><![CDATA[davidonzo]]></dc:creator>
		<pubDate>Mon, 21 May 2018 16:47:30 +0000</pubDate>
				<category><![CDATA[infosec]]></category>
		<guid isPermaLink="false">https://www.davidonzo.com/?p=1464</guid>

					<description><![CDATA[In vista dei prossimi corsi MISP che si terranno a Roma, in AgID e Banca D&#8217;Italia fra la fine di Maggio e l&#8217;inizio di Giugno, mi è sembrato utile condividere alcuni appunti sparsi sulla piattaforma e di farlo prevalentemente in Italiano. In questa prima puntata sarà riportata la procedura di installazione di MISP in ambiente &#8230; <a href="https://www.davidonzo.com/2018/05/21/misp-malware-information-sharing-platform-installazione/" class="more-link">Continue reading <span class="screen-reader-text">MISP &#8211; Malware Information Sharing Platform &#8211; Installazione</span></a>]]></description>
										<content:encoded><![CDATA[<p><img class="alignleft wp-image-1490" src="https://www.davidonzo.com/wp-content/uploads/2018/05/misp-logo.png" alt="" width="200" height="147" />In vista dei prossimi corsi <a href="https://github.com/MISP/">MISP</a> che si terranno a <a href="https://www.eventbrite.com/o/circl-9283844163">Roma, in AgID e Banca D&#8217;Italia fra la fine di Maggio e l&#8217;inizio di Giugno</a>, mi è sembrato utile condividere alcuni appunti sparsi sulla piattaforma e di farlo prevalentemente in Italiano. In questa prima puntata sarà riportata la procedura di installazione di MISP in ambiente <a href="https://github.com/MISP/MISP/blob/2.4/INSTALL/INSTALL.ubuntu1604.txt">Ubuntu 16.04 LTS</a>. Si tratta di una riproposizione quasi fedele della guida pubblicata dagli stessi sviluppatori di MISP, con qualche piccola personalizzazione dettata più dal vezzo personale che da altro.</p>
<h2>1 Aggiornamento sistema</h2>
<p>Una volta installato il sistema base Ubuntu 16.04 LTS Server effettuare un aggiornamento di sistema, per assicurarsi di aver installato le ultime patch di sicurezza ed aggiornamenti software generici.</p>
<pre>:~$ sudo apt-get update --fix-missing
:~$ sudo apt-get upgrade</pre>
<h2>2 Installazione Postfix</h2>
<p>Si procede all&#8217;installazione di postfix.</p>
<pre>:~$ sudo apt-get install postfix</pre>
<p>Lo si configuri come &#8220;<strong>Sistema satellite</strong>&#8220;.</p>
<figure id="attachment_1468" aria-describedby="caption-attachment-1468" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.davidonzo.com/?attachment_id=1468" target="_blank" rel="noopener"><img class="wp-image-1468 size-medium" src="https://www.davidonzo.com/wp-content/uploads/2018/05/postfix1-300x200.png" alt="Configurazione postfix" width="300" height="200" srcset="https://www.davidonzo.com/wp-content/uploads/2018/05/postfix1-300x200.png 300w, https://www.davidonzo.com/wp-content/uploads/2018/05/postfix1-668x445.png 668w, https://www.davidonzo.com/wp-content/uploads/2018/05/postfix1.png 757w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1468" class="wp-caption-text">Configurazione postfix</figcaption></figure>
<p>Questa guida non si occupa della configurazione di postfix. Al momento si configurerà &#8220;example.com&#8221; come relayhost del mail server. Sarà cura dell&#8217;utente terminare la corretta configurazione di postfix, in funzione delle proprie esigenze e vincoli.</p>
<pre>:~$ sudo postconf -e 'relayhost = example.com'
:~$ sudo postfix reload</pre>
<h2>3 Installazione pacchetti e librerie necessarie</h2>
<p>Di seguito si installeranno i vari pacchetti, interpreti, librerie necessarie al corretto funzionamento di MISP, che per garantire le prestazioni di sharing multipiattaforma che si prefigge, ha necessità di un certo numero e di una certa qualità di applicativi da utilizzare.</p>
<pre>:~$ sudo apt-get install curl gcc git gnupg-agent make python python3 openssl redis-server sudo vim zip</pre>
<h2>4 Installazione MariaDB</h2>
<p>Sarà ora necessario installare <a href="https://mariadb.com/">MariaDB</a>, un fork del più famoso MySQL, utilizzato dagli stessi sviluppatori di MISP.</p>
<pre>:~$ sudo apt-get install mariadb-client mariadb-server
:~$ sudo mysql_secure_installation</pre>
<p>Non ci si scordi mai di mettere in sicurezza l&#8217;installazione del database server.</p>
<h2>5 Installazione e prima configurazione di Apache</h2>
<p>Si eseguano i comandi di seguito riportati.</p>
<pre>:~$ sudo apt-get install apache2 apache2-utils 
:~$ sudo a2enmod ssl
:~$ sudo a2enmod rewrite
:~$ sudo a2enmod headers
:~$ sudo a2dissite 000-default
:~$ sudo a2ensite default-ssl
:~$ sudo service apache2 restart</pre>
<p>Nei fatti, oltre all&#8217;installazione del webserver si abilitano i moduli ssl, rewrite e headers. Dopo di che si disabilita il virtualhost 000-default per attivare il default-ssl. Anche se questo verrà disattivato in un successivo passaggio, tenerlo attivo ci consente di testare il corretto funzionamento del webserver sotto SSL.</p>
<h2>6 Installazione PHP e librerie necessarie</h2>
<pre>:~$ sudo apt-get install libapache2-mod-php php php-cli php-crypt-gpg php-dev php-json php-mysql php-opcache php-readline php-redis php-xml
:~$ sudo service apache2 restart</pre>
<h2>7 Codice MISP</h2>
<p>Adesso è possibile procedere all&#8217;installazione di MISP da codice sorgente. Questi verranno gestiti direttamente tramite <a href="https://git-scm.com/">Git</a> e la piattaforma <a href="https://github.com/MISP/MISP">GitHub</a>. È possibile anche scaricare manualmente i sorgenti e procedere ad installazione manuale. Ma in questo caso il processo di aggiornamento del software richiederebbe molto più effort, dovendo di volta in volta aggiornare manualmente la piattaforma. Utilizzando Git in questa fase dell&#8217;installazione ci si assicura il mantenimento di MISP a medio/lungo termine a costi relativamente bassi.</p>
<p>Si crei una nuova cartella in /var/www che ospiterà la piattaforma MISP</p>
<pre>:~$ sudo mkdir /var/www/MISP</pre>
<p>Si assegni la nuova directory all&#8217;utenza di default del webserver, che negli ambienti Debian/Ubuntu è www-data</p>
<pre>:~$ sudo chown www-data:www-data /var/www/MISP</pre>
<p>A questo punto possiamo scaricare i sorgenti di MISP, utilizzando git come gestore di versione.</p>
<pre>:~$ sudo -u www-data git clone https://github.com/MISP/MISP.git /var/www/MISP
Cloning into '/var/www/MISP'...
remote: Counting objects: 56839, done.
remote: Compressing objects: 100% (149/149), done.
remote: Total 56839 (delta 234), reused 304 (delta 210), pack-reused 56480
Ricezione degli oggetti: 100% (56839/56839), 43.75 MiB | 3.25 MiB/s, done.
Risoluzione dei delta: 100% (42306/42306), done.
Checking connectivity... fatto.</pre>
<p>Effettuare il checkout della versione all&#8217;ultima disponibile.</p>
<pre>:~$ sudo -u www-data git checkout tags/$(git describe --tags `git rev-list --tags --max-count=1`)
Note: checking out 'tags/v2.4.91'.

You are in 'detached HEAD' state. You can look around, make experimental
changes and commit them, and you can discard any commits you make in this
state without impacting any branches by performing another checkout.

If you want to create a new branch to retain commits you create, you may
do so (now or later) by using -b with the checkout command again. Example:

git checkout -b &lt;new-branch-name&gt;

HEAD si trova ora a 4ad7a4a... Merge branch '2.4' of github.com:MISP/MISP into 2.4</pre>
<p>Alla data del presente articolo, la versione di checkout disponibile è la 2.4.91. Se si desidera effettuare un ulteriore controllo, è possibile visitare la home page del repository <a href="https://github.com/MISP/misp">MISP su GitHub</a>.</p>
<figure id="attachment_1473" aria-describedby="caption-attachment-1473" style="width: 315px" class="wp-caption aligncenter"><a href="https://www.davidonzo.com/?attachment_id=1473" target="_blank" rel="noopener"><img class="wp-image-1473 size-full" src="https://www.davidonzo.com/wp-content/uploads/2018/05/mispversion.png" alt="Versione MISP" width="315" height="488" srcset="https://www.davidonzo.com/wp-content/uploads/2018/05/mispversion.png 315w, https://www.davidonzo.com/wp-content/uploads/2018/05/mispversion-194x300.png 194w" sizes="(max-width: 315px) 100vw, 315px" /></a><figcaption id="caption-attachment-1473" class="wp-caption-text">Versione MISP</figcaption></figure>
<p>Infire configureremo git per ignorare le differenze fra permessi di file locali e remoti.</p>
<pre>:~$ sudo -u www-data git config core.filemode false</pre>
<h2>8 Installare STIX</h2>
<p>MISP è <a href="https://oasis-open.github.io/cti-documentation/stix/intro.html">STIX</a> compliance per molti aspetti relativi alla gestione degli IoC. Gestisce sia il formato STIX 1.x che il formato 2.x, ma necessita delle librerie ufficiali. Di seguito si procederà ad installarle ad uso e consumo dell&#8217;applicativo.</p>
<pre>:~$ sudo apt-get install python-dev python-pip python3-pip libxml2-dev libxslt1-dev zlib1g-dev python-setuptools
:~$ cd /var/www/MISP/app/files/scripts
:~$ sudo -u www-data git clone https://github.com/CybOXProject/python-cybox.git
:~$ sudo -u www-data git clone https://github.com/STIXProject/python-stix.git
:~$ cd /var/www/MISP/app/files/scripts/python-cybox:
:~$ sudo python setup.py install
:~$ cd /var/www/MISP/app/files/scripts/python-stix
:~$ sudo python setup.py install</pre>
<p>Installare mixbox in quanto nuova dipendenza per STIX.</p>
<pre>:~$ cd /var/www/MISP/app/files/scripts/
:~$ sudo -u www-data git clone https://github.com/CybOXProject/mixbox.git
:~$ cd /var/www/MISP/app/files/scripts/mixbox
:~$ sudo python setup.py install</pre>
<p>Infine, installare STIX2 (richiesto python3)</p>
<pre>:~$ pip3 install stix2</pre>
<h2>9 Installare CakePHP</h2>
<p>CakePHP è il framework di sviluppo su cui si basa gran parte dell&#8217;applicativo. Oltre a gestire l&#8217;interfaccia utente, CakePHP è in grado di gestire i job del server, fondamentali per la sincronizzazione fra diverse istanze MISP. Di seguito si procederà dando per scontato che si utilizzeranno tutte le configurazioni proposte dal team ufficiale di MISP.</p>
<pre>:~$ cd /var/www/MISP
:~$ sudo -u www-data git submodule init
:~$ sudo -u www-data git submodule update
:~$ sudo -u www-data git submodule foreach git config core.filemode false</pre>
<p>I pacchetti di seguito installati via composer del PHP sono necessari proprio per la funzionalità di gestione job e code, deputata al framework CakePHP.</p>
<pre>:~$ cd /var/www/MISP/app
:~$ sudo -u www-data php composer.phar require kamisama/cake-resque:4.1.2
:~$ sudo -u www-data php composer.phar config vendor-dir Vendor
:~$ sudo -u www-data php composer.phar install</pre>
<p>Abilitare CakeResque con PHP-Redis</p>
<pre>:~$ sudo phpenmod redis</pre>
<p>Infine copiare il relativo file di configurazione nella directory applicativa di seguito riportata.</p>
<pre>:~$ sudo -u www-data cp -fa /var/www/MISP/INSTALL/setup/config.php /var/www/MISP/app/Plugin/CakeResque/Config/config.php</pre>
<p>Infine, settare correttamente i permessi delle directory di lavoro.</p>
<pre>:~$ sudo chown -R www-data:www-data /var/www/MISP
:~$ sudo chmod -R 750 /var/www/MISP
:~$ sudo chmod -R g+ws /var/www/MISP/app/tmp
:~$ sudo chmod -R g+ws /var/www/MISP/app/files
:~$ sudo chmod -R g+ws /var/www/MISP/app/files/scripts/tmp</pre>
<h2>10 Creazione e configurazione database</h2>
<p>A questo punto ci occuperemo di configurare il database e prepararlo per poter ospitare gli eventi MISP. Per questa fase servirà l&#8217;utilizzo della password di root del database sql creata al precedente punto 4.</p>
<pre>:~$ sudo mysql -u root -p
MariaDB [(none)]&gt; create database misp;
MariaDB [(none)]&gt; grant usage on *.* to misp@localhost identified by 'password';
MariaDB [(none)]&gt; grant all privileges on misp.* to misp@localhost;
MariaDB [(none)]&gt; flush privileges;
MariaDB [(none)]&gt; \q</pre>
<p>È stato creato il database &#8220;misp&#8221; a cui ha accesso l&#8217;utente &#8220;misp&#8221; a cui è stata assegnata la password &#8220;password&#8221; (per ambienti di produzione sarà richiesta una certa complessità della password).</p>
<p>Sarà ora possibile importare una schema database vuoto.</p>
<pre>:~$ sudo -u www-data sh -c "mysql -u misp -p misp &lt; /var/www/MISP/INSTALL/MYSQL.sql"</pre>
<h2>11 Configurazione webserver Apache2</h2>
<p>Per la configurazione del webserver Apache, si userà il FQDN &#8220;misp.local&#8221;. Come prima cosa si dovrà controllare la versione del webserver installata.</p>
<pre>:~$ sudo apache2 -v
Server version: Apache/2.4.18 (Ubuntu)</pre>
<p>Qualora non si abbia altra disponibilità, sarà necessario generare un certificato SSL self signed. Procedere come di seguito specificato.</p>
<pre>:~$ sudo openssl req -newkey rsa:4096 -days 365 -nodes -x509 -keyout /etc/ssl/private/misp.local.key -out /etc/ssl/private/misp.local.crt

Generating a 4096 bit RSA private key
........................++
.......................++
writing new private key to '/etc/ssl/private/misp.local.key'
-----
You are about to be asked to enter information that will be incorporated
into your certificate request.
What you are about to enter is what is called a Distinguished Name or a DN.
There are quite a few fields but you can leave some blank
For some fields there will be a default value,
If you enter '.', the field will be left blank.
-----
Country Name (2 letter code) [AU]:IT
State or Province Name (full name) [Some-State]:Italy
Locality Name (eg, city) []:Rome
Organization Name (eg, company) [Internet Widgits Pty Ltd]:MyCompany
Organizational Unit Name (eg, section) []:SecUnit
Common Name (e.g. server FQDN or YOUR name) []:misp.local
Email Address []:misp@misp.local</pre>
<p>Creare e modificare un nuovo file di configurazione VirtualHost di Apache2.</p>
<pre>:~$ sudo nano /etc/apache2/sites-available/misp-ssl.conf</pre>
<p>Come configurazione del VirtualHost si propone la seguente.</p>
<pre>&lt;VirtualHost *:80&gt;
    ServerName misp.local
    Redirect permanent / https://misp.local

    LogLevel warn
    ErrorLog /var/log/apache2/misp.local_error.log
    CustomLog /var/log/apache2/misp.local_access.log combined
    ServerSignature Off
&lt;/VirtualHost&gt;
&lt;VirtualHost *:443&gt;
    ServerAdmin misp@misp.local
    ServerName misp.local
    DocumentRoot /var/www/MISP/app/webroot
    
    &lt;Directory /var/www/MISP/app/webroot&gt;
        Options -Indexes
        AllowOverride all
        Require all granted
    &lt;/Directory&gt;

    SSLEngine On
    SSLCertificateFile /etc/ssl/private/misp.local.crt
    SSLCertificateKeyFile /etc/ssl/private/misp.local.key

    LogLevel warn
    ErrorLog /var/log/apache2/misp.local_error.log
    CustomLog /var/log/apache2/misp.local_access.log combined
    ServerSignature Off
    Header set X-Content-Type-Options nosniff
    Header set X-Frame-Options DENY
&lt;/VirtualHost&gt;</pre>
<p>Disabilitare il VHost defailt-ssl.conf ed abilitare il nuovo dedicato a MISP.</p>
<pre>:~$ sudo a2dissite default-ssl
:~$ sudo a2ensite misp-ssl
:~$ sudo service apache2 restart</pre>
<p>Se lo si ritiene necessario, è anche possibile utilizzare una configurazione di log rotation disponibile nelle directory di installo di MISP.</p>
<pre>:~$ sudo cp /var/www/MISP/INSTALL/misp.logrotate /etc/logrotate.d/misp</pre>
<h2>12 Configurazione applicativa di MISP</h2>
<p>Questa fase risulta molto delicata. Seppur qualsiasi errore è in qualche modo rimediabile, quanto configurato qui avrà impatto sull&#8217;utilizzo stesso della piattaforma e modifiche a posteriori potrebbero risultare in una pardita di informazioni, anche se mai possono risultare in una perdita di dati. Quanto stabilito in questa fase, seppur di stampo prettamente sistemistico avrà impatto operativo notevole. Si consiglia di approfondire questa fase attingendo ad informazioni dettagliate disponibili nel sito del <a href="https://www.circl.lu/services/misp-training-materials/">CIRCL.LU</a>.</p>
<p>Effettuare la copia dei seguenti file.</p>
<pre>:~$ sudo -u www-data cp -a /var/www/MISP/app/Config/bootstrap.default.php /var/www/MISP/app/Config/bootstrap.php
:~$ sudo -u www-data cp -a /var/www/MISP/app/Config/database.default.php /var/www/MISP/app/Config/database.php
:~$ sudo -u www-data cp -a /var/www/MISP/app/Config/core.default.php /var/www/MISP/app/Config/core.php
:~$ sudo -u www-data cp -a /var/www/MISP/app/Config/config.default.php /var/www/MISP/app/Config/config.php</pre>
<p>Nel file &#8220;database.php&#8221; andrà configurato l&#8217;utente MariaDB creato nei punti precedenti.</p>
<pre>:~$ sudo -u www-data nano /var/www/MISP/app/Config/database.php</pre>
<figure id="attachment_1481" aria-describedby="caption-attachment-1481" style="width: 448px" class="wp-caption aligncenter"><a href="https://www.davidonzo.com/?attachment_id=1481"><img class="wp-image-1481 size-full" src="https://www.davidonzo.com/wp-content/uploads/2018/05/dbconfig.png" alt="Configurazione MariaDB" width="448" height="286" srcset="https://www.davidonzo.com/wp-content/uploads/2018/05/dbconfig.png 448w, https://www.davidonzo.com/wp-content/uploads/2018/05/dbconfig-300x192.png 300w" sizes="(max-width: 448px) 100vw, 448px" /></a><figcaption id="caption-attachment-1481" class="wp-caption-text">Configurazione MariaDB</figcaption></figure>
<p>Nel file &#8220;config.php&#8221; è necessario modificare il <a href="https://en.wikipedia.org/wiki/Salt_(cryptography)">SALT</a> di base dell&#8217;applicazione (che deve essere di 32 byte) ed altre opzioni, come il &#8220;baseurl&#8221; che descrive la URL di base dell&#8217;applicativo, l&#8217;opzione &#8220;org&#8221; con cui è possibile settare il nome dell&#8217;organizzazione di default e altro. Moltre di queste opzioni potranno poi essere gestite da pannello di controllo.</p>
<pre>:~$ sudo -u www-data nano /var/www/MISP/app/Config/config.php</pre>
<figure id="attachment_1487" aria-describedby="caption-attachment-1487" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.davidonzo.com/?attachment_id=1487"><img class="wp-image-1487 size-medium" src="https://www.davidonzo.com/wp-content/uploads/2018/05/altroConf-300x211.png" alt="Configurazione MISP" width="300" height="211" srcset="https://www.davidonzo.com/wp-content/uploads/2018/05/altroConf-300x211.png 300w, https://www.davidonzo.com/wp-content/uploads/2018/05/altroConf-768x541.png 768w, https://www.davidonzo.com/wp-content/uploads/2018/05/altroConf-668x470.png 668w, https://www.davidonzo.com/wp-content/uploads/2018/05/altroConf.png 997w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1487" class="wp-caption-text">Configurazione MISP</figcaption></figure>
<p>Infine si settano i permessi dei file correttamente.</p>
<pre>:~$ sudo chown -R www-data:www-data /var/www/MISP/app/Config
:~$ sudo chmod -R 750 /var/www/MISP/app/Config</pre>
<h2>13 Chiave di cifratura GPG</h2>
<p>Per consentire all&#8217;applicativo l&#8217;invio di email cifrate è necessario creare una coppia di chiavi GPG, avendo cura di generare la chiave per lo stesso indirizzo email configurato nel file &#8220;config.php&#8221;.</p>
<pre>:~$ sudo -u www-data gpg --homedir /var/www/MISP/.gnupg --gen-key
gpg (GnuPG) 1.4.20; Copyright (C) 2015 Free Software Foundation, Inc.
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.

gpg: portachiavi "/var/www/MISP/.gnupg/secring.gpg" creato
gpg: portachiavi "/var/www/MISP/.gnupg/pubring.gpg" creato
Selezionare il tipo di chiave:
(1) RSA e RSA (predefinito)
(2) DSA ed Elgaman
(3) DSA (solo firma)
(4) RSA (solo firma)
Selezione? 1
La lunghezza delle chiavi RSA è compresa tra 1024 e 4096 bit.
Quale dimensione impostare per la chiave? (2048) 4096
La dimensione chiave richiesta è 4096 bit
Specificare la durata di validità della chiave.
0 = la chiave non scade
&lt;N&gt; = la chiave scade dopo N giorni
&lt;N&gt;w = la chiave scade dopo N settimane
&lt;N&gt;m = la chiave scade dopo N mesi
&lt;N&gt;y = la chiave scade dopo N anni
Per quanto tempo deve essere valida la chiave? (0) 365
La chiave scade il mar 21 mag 2019 11:16:20 CEST
È tutto corretto? (s/N) s

È necessario un ID utente per identificare la propria chiave; il software
costruisce l'ID utente a partire da nome reale, commento e indirizzo email
in questa forma:
"Mario Rossi (commento) mario.rossi@example.net"

Nome reale: Misp Local
Indirizzo email: misp@misp.local
Commento: 
È stato selezionato questo USER-ID:
"Misp Local &lt;misp@misp.local&gt;"

Modificare (n)ome, (c)ommento, (e)mail oppure (o)k/(u)scire? o
È necessaria una passphrase per proteggere la proprio chiave segreta.

Passphrase:

gpg: /var/www/MISP/.gnupg/trustdb.gpg: creato il trustdb
gpg: chiave 24C4188D contrassegnata come completamente affidabile
chiavi pubbliche e segrete create e firmate.

gpg: controllo del trustdb
gpg: necessari: 3 marginali, 1 completi, modello di fiducia PGP
gpg: livello: 0 valido: 1 firmato: 0 fiducia: 0-, 0q, 0n, 0m, 0f, 1u
gpg: il prossimo controllo del trustdb sarà eseguito il 2019-05-21
pub 4096R/24C4188D 2018-05-21 [scadenza: 2019-05-21]
Impronta digitale della chiave = 0C94 3FD0 4E3C F36D C33C 0B03 82B1 3167 24C4 188D
uid Misp Local &lt;misp@misp.local&gt;
sub 4096R/C9565802 2018-05-21 [scadenza: 2019-05-21]</pre>
<p>Esportare la chiave pubblica nella webroot.</p>
<pre>:~$ sudo -u www-data sh -c "gpg --homedir /var/www/MISP/.gnupg --export --armor misp@misp.local &gt; /var/www/MISP/app/webroot/gpg.asc"</pre>
<h2>14 Configurazione &#8220;workers&#8221;</h2>
<p>Come ultimissima cosa, configuriamo i workers di MISP per avviarsi all&#8217;avvio del sistema. I workers permettono una moteplicità di operazioni alla piattaforma, molte delle quali critiche. Consentono ad esempio la gestione dei job di sincronizzazione fra più server MISP, la gestione delle code email, della cache applicativa e molto altro. È vivamente consigliata la configurazione come da manuale di questo elemento.</p>
<p>Per prima cosa, diamo allo script di avvio dei workers i permessi di esecuzione.</p>
<pre>:~$ sudo chmod +x /var/www/MISP/app/Console/worker/start.sh</pre>
<p>Di seguito modifichiamo il file /etc/rc.local per richiamare lo script all&#8217;avvio del sistema.</p>
<pre>:~$ sudo nano /etc/rc.local</pre>
<figure id="attachment_1486" aria-describedby="caption-attachment-1486" style="width: 672px" class="wp-caption aligncenter"><a href="https://www.davidonzo.com/?attachment_id=1486"><img class="wp-image-1486 size-full" src="https://www.davidonzo.com/wp-content/uploads/2018/05/rclocal.png" alt="Configurazione workers" width="672" height="287" srcset="https://www.davidonzo.com/wp-content/uploads/2018/05/rclocal.png 672w, https://www.davidonzo.com/wp-content/uploads/2018/05/rclocal-300x128.png 300w, https://www.davidonzo.com/wp-content/uploads/2018/05/rclocal-668x285.png 668w" sizes="(max-width: 672px) 100vw, 672px" /></a><figcaption id="caption-attachment-1486" class="wp-caption-text">Configurazione workers</figcaption></figure>
<h2>15 Riavvio e primo login</h2>
<p>A questo punto è possibile riavviare il server e successivamente visitare la pagina web https://misp.local (sostituite la URL con il vosto FQDN scelto). E se le istruzioni sono andate a buon fine, vi troverete di fronte la form di login, in cui userete come prime e temporenee credenziali la coppia nome utente/password &#8220;<strong>admin@admin.test/admin</strong>&#8220;.</p>
<figure id="attachment_1489" aria-describedby="caption-attachment-1489" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.davidonzo.com/?attachment_id=1489"><img class="wp-image-1489 size-medium" src="https://www.davidonzo.com/wp-content/uploads/2018/05/misp.login_-300x254.png" alt="MISP Login" width="300" height="254" srcset="https://www.davidonzo.com/wp-content/uploads/2018/05/misp.login_-300x254.png 300w, https://www.davidonzo.com/wp-content/uploads/2018/05/misp.login_-668x566.png 668w, https://www.davidonzo.com/wp-content/uploads/2018/05/misp.login_.png 671w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1489" class="wp-caption-text">MISP Login</figcaption></figure>
<h2>16 Hardening</h2>
<p>È necessario procedere alla hardenizzazione di tutto quanto fin qui installato e configurato. In particolare:</p>
<ul>
<li>Il sistema operativo;</li>
<li>Il webserver Apache;</li>
<li>MariaDB;</li>
<li>Altro&#8230;</li>
</ul>
<h2>17 Funzionalità opzionali</h2>
<p>MISP utilizza <a href="http://zeromq.org/">ZeroMQ</a> per alcuni importanti aspetti delle funzionalità di sottoscrizione e sharing. La funzionalità è presentata come opzionale dal team di MISP, in quanto ci sono diverse modalità di sottoscrizione e sharing utilizzando MISP. Tuttavia si consiglia vivamente di installare ed abilitare le funzionalità di ZeroMQ, al fine di non privarsi della potenza del software con piene funzionalità.</p>
<p>Eseguire i due comandi che seguono.</p>
<pre>:~$ sudo pip install pyzmq
:~$ sudo pip install redis</pre>
<h2>Conclusioni</h2>
<p>Il lettore più attento avrà notato come la procedura di installazione di MISP sia tutt&#8217;altro che banale. Questo perché MISP è una vera e propria &#8220;Piattaforma&#8221;. Ovvero un set di strumenti e servizi che consentono l&#8217;archiviazione, la correlazione, l&#8217;analisi e lo sharing di informazioni riguardanti in particolare aspetti vicini alla sicurezza informatica.</p>
<p>Comprendere la profonda interazione che si crea dall&#8217;uso di tali strumenti, serve ad un uso consapevole dell&#8217;applicativo e delle sue potenzialità. MISP offre un contesto operativo modulare ed estendibile. In grado di adattarsi ai diversi contesti operativi.</p>
<p>Mi riprometto di scrivere, tempo permettendo, altri post sull&#8217;argomento. <strong>HTH</strong>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.davidonzo.com/2018/05/21/misp-malware-information-sharing-platform-installazione/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Some news and specification about infosec.cert-pa.it</title>
		<link>https://www.davidonzo.com/2017/05/31/some-news-and-specification-about-infosec-cert-pa-it/</link>
					<comments>https://www.davidonzo.com/2017/05/31/some-news-and-specification-about-infosec-cert-pa-it/#respond</comments>
		
		<dc:creator><![CDATA[davidonzo]]></dc:creator>
		<pubDate>Wed, 31 May 2017 17:16:23 +0000</pubDate>
				<category><![CDATA[infosec]]></category>
		<category><![CDATA[PentestIT]]></category>
		<guid isPermaLink="false">http://www.davidonzo.com/?p=1436</guid>

					<description><![CDATA[Someone noticed the old Pentest.it is now &#8220;infosec.cert-pa.it&#8221;. Since last time I wrote about it, the service has been improved with new features and sections focused on IoC collection and correlation. What&#8217;s new. Two new modules added to the web application: The BlockList module The Analyzer module Blocklist Module The blocklist module collects IoCs from &#8230; <a href="https://www.davidonzo.com/2017/05/31/some-news-and-specification-about-infosec-cert-pa-it/" class="more-link">Continue reading <span class="screen-reader-text">Some news and specification about infosec.cert-pa.it</span></a>]]></description>
										<content:encoded><![CDATA[<p>Someone noticed the old Pentest.it is now &#8220;infosec.cert-pa.it&#8221;. Since last time I wrote about it, the service has been improved with new features and sections focused on IoC collection and correlation.</p>
<p>What&#8217;s new.<br />
Two new modules added to the web application:</p>
<ul>
<li><a href="https://infosec.cert-pa.it/blocklistcheck.html">The BlockList module</a></li>
<li><a href="https://infosec.cert-pa.it/analyze/submission.html">The Analyzer module</a></li>
</ul>
<h3>Blocklist Module</h3>
<p>The blocklist module collects IoCs from a large number of public lists. The web application allow you to search for URLs, IPs and FQDNs. You can search a single item using the &#8220;Search&#8221; tab. The query result display you if an exact match will be found and also the similar results.</p>
<p><a href="http://www.davidonzo.com/wp-content/uploads/2017/05/block_simple.png"><img class="imgborder aligncenter wp-image-1444 size-medium" src="http://www.davidonzo.com/wp-content/uploads/2017/05/block_simple-300x122.png" alt="text" width="300" height="122" srcset="https://www.davidonzo.com/wp-content/uploads/2017/05/block_simple-300x122.png 300w, https://www.davidonzo.com/wp-content/uploads/2017/05/block_simple-668x271.png 668w, https://www.davidonzo.com/wp-content/uploads/2017/05/block_simple.png 732w" sizes="(max-width: 300px) 100vw, 300px" /></a><br />
Using the &#8220;Bulk Search&#8221; tab you can submit 100 items per query, but in this case only the exact match will be displayed. In any case you can export the results in CSV format.</p>
<p><a href="http://www.davidonzo.com/wp-content/uploads/2017/05/block_bulk.png"><img class="imgborder aligncenter wp-image-1442 size-medium" src="http://www.davidonzo.com/wp-content/uploads/2017/05/block_bulk-300x150.png" alt="" width="300" height="150" srcset="https://www.davidonzo.com/wp-content/uploads/2017/05/block_bulk-300x150.png 300w, https://www.davidonzo.com/wp-content/uploads/2017/05/block_bulk-668x334.png 668w, https://www.davidonzo.com/wp-content/uploads/2017/05/block_bulk.png 707w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<h3>Analyzer Module</h3>
<p>The analyzer module consists in a automatic souspicious file analyzer. Any page contains the static analysis of the file and a basic bahavior analysis. The submitted files are taken by OSINT sources (and not only). You can subscribe the RSS feed, if you want to be notified for every submitted file.</p>
<p><a href="http://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze.png"><img class="imgborder aligncenter wp-image-1445 size-medium" src="http://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze-300x137.png" alt="" width="300" height="137" srcset="https://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze-300x137.png 300w, https://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze-768x350.png 768w, https://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze-1024x467.png 1024w, https://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze-668x305.png 668w, https://www.davidonzo.com/wp-content/uploads/2017/05/lates_analyze.png 1186w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>The easiest way to find information is the use of the dedicated search engine. You can search by MD5, SHA1 and SHA256 just submitting the correspondent hash.</p>
<p><a href="http://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_search.png"><img class="imgborder aligncenter wp-image-1441 size-medium" src="http://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_search-300x261.png" alt="" width="300" height="261" srcset="https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_search-300x261.png 300w, https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_search.png 584w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>Special searches are available with the use of the following keywords:</p>
<ul>
<li>imphash:$IMPORT_TABLE_HASH</li>
<li>domain:$FQDN</li>
<li>url:$URL_HOSTING_MALWARE</li>
</ul>
<p>The search results page use a permalink structure you can use for further searches. The search results are exportable in CSV format. The CSV link is availables on the same page and reflects the permalink structure of the web search.</p>
<p><a href="http://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results.png"><img class="imgborder aligncenter wp-image-1440 size-medium" src="http://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results-300x114.png" alt="" width="300" height="114" srcset="https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results-300x114.png 300w, https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results-768x293.png 768w, https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results-1024x390.png 1024w, https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results-668x255.png 668w, https://www.davidonzo.com/wp-content/uploads/2017/05/analyzed_results.png 1194w" sizes="(max-width: 300px) 100vw, 300px" /></a></p>
<p>A new way to aggregate data is the use of the tagging system. Occasionally a report includes comments. Often comments are used to add a keywords, making the report aggregable via tag search. Just an example using one of the latest detected threat: <strong><a href="https://infosec.cert-pa.it/analyze/search/0/0/0/0/0/0/tag:EternalRocks.html">#EternalRocks</a></strong>.</p>
<p>Any report can be exported in PDF format, at this time with limited information.</p>
<p>Hope this help.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.davidonzo.com/2017/05/31/some-news-and-specification-about-infosec-cert-pa-it/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Just another ransomware Locky version spreads via JS file</title>
		<link>https://www.davidonzo.com/2016/03/08/just-another-ransomware-locky-version-spreads-via-js-file/</link>
					<comments>https://www.davidonzo.com/2016/03/08/just-another-ransomware-locky-version-spreads-via-js-file/#respond</comments>
		
		<dc:creator><![CDATA[davidonzo]]></dc:creator>
		<pubDate>Mon, 07 Mar 2016 23:03:49 +0000</pubDate>
				<category><![CDATA[infosec]]></category>
		<guid isPermaLink="false">http://www.davidonzo.com/?p=1423</guid>

					<description><![CDATA[This article wants to explain a way for malware coders to spread malicious softwares in the wild. And of course the easy way is to convince the victim to run the malicoius code himlsef. No 0day is required, no known vulnerability too. In these conditions, usually the attack pattern preferred is &#8220;Spear Phishing&#8220;, consisting in &#8230; <a href="https://www.davidonzo.com/2016/03/08/just-another-ransomware-locky-version-spreads-via-js-file/" class="more-link">Continue reading <span class="screen-reader-text">Just another ransomware Locky version spreads via JS file</span></a>]]></description>
										<content:encoded><![CDATA[<p>This article wants to explain a way for malware coders to spread malicious softwares in the wild. And of course the easy way is to convince the victim to run the malicoius code himlsef. No 0day is required, no known vulnerability too.</p>
<p>In these conditions, usually the attack pattern preferred is &#8220;<a href="https://capec.mitre.org/data/definitions/163.html" target="_blank">Spear Phishing</a>&#8220;, consisting in a email containing, not the malware itself, but a dropper, written with a script language (formally just a text file), with the capabilities to download the malware and run it on the target system. In others terms: a JavaScript. Below an example.</p>
<p>The original JavaScript file.</p>
<figure id="attachment_1428" aria-describedby="caption-attachment-1428" style="width: 600px" class="wp-caption alignnone"><a href="http://www.davidonzo.com/wp-content/uploads/2016/03/1.png" rel="attachment wp-att-1428"><img class="wp-image-1428 size-large" src="http://www.davidonzo.com/wp-content/uploads/2016/03/1-1024x509.png" alt="1" width="600" height="298" srcset="https://www.davidonzo.com/wp-content/uploads/2016/03/1-1024x509.png 1024w, https://www.davidonzo.com/wp-content/uploads/2016/03/1-300x149.png 300w, https://www.davidonzo.com/wp-content/uploads/2016/03/1-768x382.png 768w, https://www.davidonzo.com/wp-content/uploads/2016/03/1-668x332.png 668w, https://www.davidonzo.com/wp-content/uploads/2016/03/1.png 1910w" sizes="(max-width: 600px) 100vw, 600px" /></a><figcaption id="caption-attachment-1428" class="wp-caption-text">The original file</figcaption></figure>
<p>As you know, comments are useless. Just remove it!</p>
<figure id="attachment_1427" aria-describedby="caption-attachment-1427" style="width: 600px" class="wp-caption alignnone"><a href="http://www.davidonzo.com/wp-content/uploads/2016/03/2.png" rel="attachment wp-att-1427"><img class="size-large wp-image-1427" src="http://www.davidonzo.com/wp-content/uploads/2016/03/2-1024x290.png" alt="Comments removed" width="600" height="170" srcset="https://www.davidonzo.com/wp-content/uploads/2016/03/2-1024x290.png 1024w, https://www.davidonzo.com/wp-content/uploads/2016/03/2-300x85.png 300w, https://www.davidonzo.com/wp-content/uploads/2016/03/2-768x218.png 768w, https://www.davidonzo.com/wp-content/uploads/2016/03/2-668x189.png 668w, https://www.davidonzo.com/wp-content/uploads/2016/03/2.png 1803w" sizes="(max-width: 600px) 100vw, 600px" /></a><figcaption id="caption-attachment-1427" class="wp-caption-text">Comments removed</figcaption></figure>
<p>Now, take a look at the variable named &#8220;<strong>XyuHqSR</strong>&#8220;. It is a multidimensional array, referenced in the malicious code for six times. We can parse it to extract the strings used by the JS file. Just run this code.</p>
<figure id="attachment_1431" aria-describedby="caption-attachment-1431" style="width: 300px" class="wp-caption alignnone"><a href="http://www.davidonzo.com/wp-content/uploads/2016/03/5.png" rel="attachment wp-att-1431"><img class="wp-image-1431 size-medium" src="http://www.davidonzo.com/wp-content/uploads/2016/03/5-300x86.png" alt="5" width="300" height="86" srcset="https://www.davidonzo.com/wp-content/uploads/2016/03/5-300x86.png 300w, https://www.davidonzo.com/wp-content/uploads/2016/03/5-768x221.png 768w, https://www.davidonzo.com/wp-content/uploads/2016/03/5-668x192.png 668w, https://www.davidonzo.com/wp-content/uploads/2016/03/5.png 951w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1431" class="wp-caption-text">Parsing the evil string</figcaption></figure>
<p>To obtain the following strings, prepended by the array index.</p>
<figure id="attachment_1430" aria-describedby="caption-attachment-1430" style="width: 259px" class="wp-caption alignnone"><a href="http://www.davidonzo.com/wp-content/uploads/2016/03/6.png" rel="attachment wp-att-1430"><img class="size-full wp-image-1430" src="http://www.davidonzo.com/wp-content/uploads/2016/03/6.png" alt="Decripted strings" width="259" height="145" /></a><figcaption id="caption-attachment-1430" class="wp-caption-text">Decripted strings</figcaption></figure>
<p>Now, with a bit of &#8220;search &amp; replace&#8221; and some string concatenations (follow the &#8220;+&#8221;  character&#8230;), the result is a clean file you don&#8217;t need to execute in a sandbox to get the behavioural informations.</p>
<figure id="attachment_1426" aria-describedby="caption-attachment-1426" style="width: 300px" class="wp-caption alignnone"><a href="http://www.davidonzo.com/wp-content/uploads/2016/03/4.png" rel="attachment wp-att-1426"><img class="size-medium wp-image-1426" src="http://www.davidonzo.com/wp-content/uploads/2016/03/4-300x191.png" alt="The clean JavaScript file" width="300" height="191" srcset="https://www.davidonzo.com/wp-content/uploads/2016/03/4-300x191.png 300w, https://www.davidonzo.com/wp-content/uploads/2016/03/4-768x490.png 768w, https://www.davidonzo.com/wp-content/uploads/2016/03/4-668x426.png 668w, https://www.davidonzo.com/wp-content/uploads/2016/03/4.png 771w" sizes="(max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-1426" class="wp-caption-text">The clean JavaScript file</figcaption></figure>
<p>Easy to read now, ins&#8217;t it? <img src="https://s.w.org/images/core/emoji/12.0.0-1/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>IoC:</p>
<ul>
<li>The JS file: <a href="https://www.virustotal.com/en/file/a1838683008b9274dff0494465fb16a2984725d3ef28fbaa79bb5d301493c37f/analysis/1457367177/" target="_blank">00a9278b3f64e6f0ce633ac191825e5e</a></li>
<li>The downloaded malware: <a href="https://www.virustotal.com/en/file/dbf6e09c1ee66ae22b9ede51e931e8da444b0b7eefc7817a9f220d8077ee2d44/analysis/1457367203/" target="_blank">e4e1325c4ded2cd8b4487f8a16c5095b</a> (<a href="https://twitter.com/search?q=%23locky&amp;src=typd" target="_blank">#Locky</a>)</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.davidonzo.com/2016/03/08/just-another-ransomware-locky-version-spreads-via-js-file/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Pentest.IT Statistics now provides product family stats</title>
		<link>https://www.davidonzo.com/2015/05/03/pentest-it-statistics-now-provides-product-family-stats/</link>
					<comments>https://www.davidonzo.com/2015/05/03/pentest-it-statistics-now-provides-product-family-stats/#respond</comments>
		
		<dc:creator><![CDATA[davidonzo]]></dc:creator>
		<pubDate>Sun, 03 May 2015 17:10:41 +0000</pubDate>
				<category><![CDATA[infosec]]></category>
		<category><![CDATA[PentestIT]]></category>
		<guid isPermaLink="false">http://www.davidonzo.com/?p=1403</guid>

					<description><![CDATA[Finally I decide to release some new feature for Pentest.IT Statistics. Dozens of minor bugs have been fixed. Some minor changes as the use of the modern &#60;datalist&#62; instead of &#60;select&#62; to avoid too long select lists. But just one real news: you can now get statistics for a specific product family. &#160; Some example: &#8230; <a href="https://www.davidonzo.com/2015/05/03/pentest-it-statistics-now-provides-product-family-stats/" class="more-link">Continue reading <span class="screen-reader-text">Pentest.IT Statistics now provides product family stats</span></a>]]></description>
										<content:encoded><![CDATA[<p>Finally I decide to release some new feature for <a href="http://stats.pentest.it/">Pentest.IT Statistics</a>. Dozens of minor bugs have been fixed. Some minor changes as the use of the modern &lt;datalist&gt; instead of &lt;select&gt; to avoid too long select lists. But just one real news: <strong>you can now get statistics for a specific product family</strong>.</p>
<p><a href="http://stats.pentest.it/"><img class=" size-full wp-image-1404 aligncenter" src="http://www.davidonzo.com/wp-content/uploads/2015/05/stats.pentest.png" alt="stats.pentest" width="646" height="472" srcset="https://www.davidonzo.com/wp-content/uploads/2015/05/stats.pentest.png 646w, https://www.davidonzo.com/wp-content/uploads/2015/05/stats.pentest-300x219.png 300w" sizes="(max-width: 646px) 100vw, 646px" /></a></p>
<p>&nbsp;</p>
<p>Some example:</p>
<ul>
<li><a href="http://stats.pentest.it/graphsp/microsoft-internet_explorer-2015.html">Internet Explorer &#8211; 2015</a></li>
<li><a href="http://stats.pentest.it/graphsp/adobe-flash_player-2015.html">Adobe Flash Player &#8211; 2015</a></li>
<li><a href="http://stats.pentest.it/graphsp/oracle-jdk-2015.html">Oracle JDK &#8211; 2015</a></li>
</ul>
<p>Remember: all URLs are <a href="http://nvd.nist.gov/cpe.cfm">CPE compliance</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.davidonzo.com/2015/05/03/pentest-it-statistics-now-provides-product-family-stats/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Pentest.IT new version and FAQ(s)</title>
		<link>https://www.davidonzo.com/2015/04/26/pentest-it-new-version-and-faqs/</link>
					<comments>https://www.davidonzo.com/2015/04/26/pentest-it-new-version-and-faqs/#respond</comments>
		
		<dc:creator><![CDATA[davidonzo]]></dc:creator>
		<pubDate>Sun, 26 Apr 2015 10:26:51 +0000</pubDate>
				<category><![CDATA[infosec]]></category>
		<category><![CDATA[PentestIT]]></category>
		<guid isPermaLink="false">http://www.davidonzo.com/?p=1395</guid>

					<description><![CDATA[As you can see, Pentest.IT has a new look and feel and some new feature available. Dozens of minor bugs have been fixed. To avoid too long select lists in search forms, the &#60;selecte&#62; element has been replaced by the newest &#60;datalist&#62; element. Many thanks to Bootstrap Framework developers, that make web design something possibile &#8230; <a href="https://www.davidonzo.com/2015/04/26/pentest-it-new-version-and-faqs/" class="more-link">Continue reading <span class="screen-reader-text">Pentest.IT new version and FAQ(s)</span></a>]]></description>
										<content:encoded><![CDATA[<p>As you can see, <a href="http://www.pentest.it">Pentest.IT</a> has a new look and feel and some new feature available. Dozens of minor bugs have been fixed. To avoid too long select lists in search forms, the &lt;selecte&gt; element has been replaced by the newest &lt;datalist&gt; element.</p>
<p>Many thanks to <a href="http://getbootstrap.com/">Bootstrap Framework developers</a>, that make web design something possibile also to me!</p>
<p>This is first time I write FAQ for this service. Considering I&#8217;m the main (and only) developer there&#8217;s no question I need to do, but maybe a lots of questions I should reply to. So, feel free to ask for more details in the comments below.</p>
<p><a href="http://www.pentest.it"><img class=" size-large wp-image-1398 aligncenter" src="http://www.davidonzo.com/wp-content/uploads/2015/04/pentestit-1024x502.png" alt="pentestit" width="600" height="294" srcset="https://www.davidonzo.com/wp-content/uploads/2015/04/pentestit-1024x502.png 1024w, https://www.davidonzo.com/wp-content/uploads/2015/04/pentestit-300x147.png 300w, https://www.davidonzo.com/wp-content/uploads/2015/04/pentestit-668x328.png 668w, https://www.davidonzo.com/wp-content/uploads/2015/04/pentestit-900x442.png 900w, https://www.davidonzo.com/wp-content/uploads/2015/04/pentestit.png 1168w" sizes="(max-width: 600px) 100vw, 600px" /></a></p>
<h3><strong>What is the Pentest.IT&#8217;s mission?</strong></h3>
<p>Pentest.IT has not specific mission. You have to consider it just as an aggregation center for public CVEs. The purpose (not the mission) is to help people and organizations in the vulnerability management process.</p>
<h3><strong>What does it mean <a href="https://cve.mitre.org/">CVE</a>?</strong></h3>
<p>CVE is the acronym for &#8220;Common Vulnerabilities and Exposures&#8221;. The <a href="https://cve.mitre.org/">MITRE</a> () defines CVEs has &#8220;<em>&#8230;a dictionary of publicly known information security vulnerabilities and exposures</em>&#8220;.</p>
<h3><strong>What is a <a href="https://cve.mitre.org/about/terminology.html">Vulnerability and an Exposure</a>?</strong></h3>
<p>A &#8220;<strong>vulnerability</strong>&#8221; is a mistake in software that can be directly used by a hacker to gain access to a system or network.<br />
An &#8220;<strong>exposure</strong>&#8221; is a system configuration issue or a mistake in software that allows access to information or capabilities that can be used by a hacker as a stepping-stone into a system or network.<br />
The different between vulnerability and explosure is that the first one is usable to compromise a system. An exposure, even if is not usable itself to hack a system, is usually an important component of a successful attack.</p>
<h3><strong>What does it mean <a href="https://cwe.mitre.org/">CWE</a>?</strong></h3>
<p>CWE is the acronym for &#8220;<strong>Common Weakness Enumeration</strong>&#8220;. CWE provides a dictionary of commons software weaknesses. When a CWE is associated to a CVE entry the vulnerability is more detailed in its weak point. By this way it should be easiest apply security solution such as logical or physical security.<br />
Note that a CWE entry describe just a weak point. It doesn&#8217;t specify how an attacker could gain advantage by the vulnerability. The attack methodologies are listed by the CAPEC dictionary.</p>
<h3><strong>What does it mean <a href="https://capec.mitre.org/">CAPEC</a>?</strong></h3>
<p>CAPEC is the acronym for &#8220;<strong>Common Attack Pattern Enumeration and Classification</strong>&#8220;. CAPEC provides a dictionary of commons attack methodologies with the scope of understanding how a real attack can be performed and a better defence strategy could be applied.<br />
CAPEC are usually mapped to one or more CWE entries.</p>
<h3><strong>What does it mean <a href="https://nvd.nist.gov/cpe.cfm">CPE</a>?</strong></h3>
<p>CPE is the acronym for &#8220;<strong>Common Platform Enumeration</strong>&#8220;. As <a href="https://nvd.nist.gov/cpe.cfm">NVD</a> report, it consist on a &#8220;&#8230;structured naming scheme for information technology systems, software, and packages. Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name&#8221;.<br />
<strong>Understanding CPE syntax is necessary to use Pentest.IT features as well!</strong></p>
<h3><strong>What is <a href="https://www.first.org/cvss">CVSS</a>?</strong></h3>
<p>CVSS is the acronym for &#8220;<strong>Common Vulnerability Scoring System</strong>&#8220;. Its value can be in a range between 0 and 10. Grater value stay for greater risks. Actually CVEs are mapped to CVSSv2 Base Score. More information about CVSS are available in <a href="https://www.first.org/cvss/cvss-guide#i2.1">first.org website</a>.</p>
<h3><strong>What is a patch?</strong></h3>
<p>In this scenario a patch is a piece of software applied to another one, designed to fix a vulnerability or a generic software flaw.</p>
<h3><strong>What are the available informations provided by Pentest.IT?</strong></h3>
<p>The service provides the followind items:</p>
<ul>
<li>Full list of published vulnerabilities with an associate RSS feed for the latest 25 items;</li>
<li>Published vulnerabilities for any specific vendor with an associate RSS feed for the latest 25 items;</li>
<li>Published vulnerabilities for a specific software with full CPE notation and an associate RSS feed for the latest 25 items;</li>
<li>Published vulnerabilities for specifics product family (go to &#8220;<a href="#productfamily">The concept of Product Family</a>&#8220;) with an associate RSS feed for the latest 25 items;</li>
<li>Full list of &#8220;Common Weakness Enumeration&#8221;;</li>
<li>Full list of &#8220;Common Attack Pattern Enumeraion and Classification&#8221;.</li>
</ul>
<p><a name="productfamily"></a></p>
<h3><strong>The concept of &#8220;Product Family&#8221;</strong></h3>
<p>Pentest.IT consider a &#8220;product family&#8221; as the aggregation of all vulnerabilities regarding a specific vendor and a specific product. In the CPE notation, two version of the same product have differents CPE entries (of course). But consider the case on you manage a set of machines where various version of the same software (aka CPE product) are installed (this happens often in the real world).<br />
To aggregate these informations in a single view use this feature.</p>
<h3><strong>Permalinks structure for HTML resources</strong></h3>
<p>Pentest.IT has a basic set of API based on the permalinks structures.</p>
<ul>
<li>Single CVE entry: /cve-YYYY-CODE.html (<a href="http://www.pentest.it/cve-2015-0876.html">example</a>);</li>
<li>Focus on specific vendor: /vendor-CPE_VENDOR.html (<a href="http://www.pentest.it/vendor-wordpress.html">example</a>);</li>
<li>All CVE for a specific vendor: /vendorcve-CPE_VENDOR.html (<a href="http://www.pentest.it/vendorcve-wordpress.html">example</a>);</li>
<li>Focus on a specific product family: /product/family/CPE_VENDOR:CPE_PRODUCT.html (<a href="http://www.pentest.it/product/family/wordpress:wordpress.html">example</a>);</li>
<li>All CVE for a specific product family: /product/family/all/CPE_VENDOR:CPE_PRODUCT.html (<a href="http://www.pentest.it/product/family/all/wordpress:wordpress.html">example</a>);</li>
<li>Focus on a specific CPE dictionary entry: /cvesoftware/CPE_PART:CPE_VENDOR:CPE_PRODUCT:CPE_VERSION:CPE_UPDATE:CPE_EDITION:CE_LANGUAGE.html (<a href="http://www.pentest.it/cvesoftware/a:microsoft:.net_framework:4.5:::.html">example</a>).</li>
</ul>
<h3><strong>Permalinks structure for RSS feed resources</strong></h3>
<p>Pentest.IT provides the following RSS feed:</p>
<ul>
<li>Latest 25 vulnerabilities: <a href="http://www.pentest.it/cve.rss">http://www.pentest.it/cve.rss</a>;</li>
<li>Specific vendor vulnerabilities: /vendor-CPE_VENDOR.rss (<a href="http://www.pentest.it/vendor-wordpress.rss">example</a>);</li>
<li>Product family vulnerabilities: /product/family/CPE_VENDOR:CPE_PRODUCT.rss (<a href="http://www.pentest.it/product/family/wordpress:wordpress.rss">example</a>);</li>
<li>Specific CPE entry: /cvesoftware/CPE_PART:CPE_VENDOR:CPE_PRODUCT:CPE_VERSION:CPE_UPDATE:CPE_EDITION:CPE_LANGUAGE.rss (<a href="http://www.pentest.it/cvesoftware/a%3Acisco%3Afiresight_system_software%3A5.3.1.1%3A%3A%3A.html">example</a>).</li>
</ul>
<h3><strong>Pentest.IT has the ability to map in a single view all available attributes:</strong></h3>
<ul>
<li>CVE Code</li>
<li>Published date</li>
<li>Updated date</li>
<li>Description</li>
<li>CVSS score and details</li>
<li>Affected OS(s)/Application(s)/Hardware(s)</li>
<li>Affected product family</li>
<li>References</li>
<li>CWE reference and related CAPEC</li>
<li>MS Patches (only for Microsoft related CVEs)</li>
<li>Related CVEs</li>
<li>JSON data representation</li>
</ul>
<h3><strong>RESTful API for CVE entries</strong></h3>
<p>Pentest.IT has the ability of give you all CVE informations in a single JSON stream. Use the following permalink structure:</p>
<ul>
<li>http://www.pentest.it/cve-AAAA-CODE.json (<a href="http://www.pentest.it/cve-2015-3043.json">example</a>).</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.davidonzo.com/2015/04/26/pentest-it-new-version-and-faqs/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Why Google should support exploit-db.com and similar projects</title>
		<link>https://www.davidonzo.com/2014/06/27/why-google-should-support-exploit-db-com-and-similar-projects/</link>
					<comments>https://www.davidonzo.com/2014/06/27/why-google-should-support-exploit-db-com-and-similar-projects/#respond</comments>
		
		<dc:creator><![CDATA[davidonzo]]></dc:creator>
		<pubDate>Fri, 27 Jun 2014 10:46:25 +0000</pubDate>
				<category><![CDATA[infosec]]></category>
		<guid isPermaLink="false">http://www.davidonzo.com/?p=1349</guid>

					<description><![CDATA[Yesterday I read a sad tweet about explot-db.com and backtrack-linux.org Google @AdSense suspends services to http://t.co/L0XLozxWNm and http://t.co/iqxbeVMTDz due to &#8220;hacking and cracking&#8221; policy violations. — offensive security (@offsectraining) 26 Giugno 2014 I don&#8217;t want to discuss about adsense&#8217;s &#8220;hacking and cracking policies&#8221;. I just want to explain why, in my opinion, this decision is &#8230; <a href="https://www.davidonzo.com/2014/06/27/why-google-should-support-exploit-db-com-and-similar-projects/" class="more-link">Continue reading <span class="screen-reader-text">Why Google should support exploit-db.com and similar projects</span></a>]]></description>
										<content:encoded><![CDATA[<p>Yesterday I read a sad tweet about <a href="http://www.exploit-db.com/" target="_blank">explot-db.com</a> and <a href="http://www.backtrack-linux.org/" target="_blank">backtrack-linux.org</a></p>
<blockquote class="twitter-tweet" lang="it"><p>Google <a href="https://twitter.com/AdSense">@AdSense</a> suspends services to <a href="http://t.co/L0XLozxWNm">http://t.co/L0XLozxWNm</a> and <a href="http://t.co/iqxbeVMTDz">http://t.co/iqxbeVMTDz</a> due to &#8220;hacking and cracking&#8221; policy violations.</p>
<p>— offensive security (@offsectraining) <a href="https://twitter.com/offsectraining/statuses/482194628209573889">26 Giugno 2014</a></p></blockquote>
<p><script src="//platform.twitter.com/widgets.js" async="" type="text/javascript" charset="utf-8">// <![CDATA[
IIdaI
// ]]&gt;</script>I don&#8217;t want to discuss about adsense&#8217;s &#8220;hacking and cracking policies&#8221;. I just want to explain why, in my opinion, this decision is wrong, dangerous for any organization and company and should increase the coasts of any information security related work.</p>
<p>Exploit-db and backtrack-linux (<a href="http://www.kali.org/" target="_blank">kali.org</a> since some time) are two of the best exploits repository in the world. Of course people can use these informations to provide malicious activities, but there&#8217;s many people that use them to <b>avoid and prevent malicious activities</b>. Using the latest available exploit, it&#8217;s possible to develop IPS signature, configure a SIEM without wait for some vendor update&#8230;</p>
<p>Every morning, a security analist make a search on exploit-db database to know if new risks are in the wild. Every day many security analists (at least, I think so) work on exploit-db to verify, categorize and finally, share dozens of exploit. This make the information security more efficient at a cheaper price. If these projects will lost adsense support definitively, the minus gain will forward the informations shared for free, in a background market where only some <a href="http://en.wikipedia.org/wiki/Black_hat_hacker#Black_hat">black hat</a> will be able to gain money by selling and buying this kind of knowledge.</p>
<p>Google isn&#8217;t a government agency and may choose to do business with those who want to, but since its core business is &#8220;<em>our web browsing</em>&#8221; the best choice should be improve the security web browsing by finance <a href="http://www.offensive-security.com/community-projects/">projects like these</a>. Maybe someone in Google think &#8220;<em>ignorance is bliss</em>&#8220;, IMHO &#8220;<em>ignorance is shit</em>&#8220;.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.davidonzo.com/2014/06/27/why-google-should-support-exploit-db-com-and-similar-projects/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
