Tom Kraz posted a great review with search examples and practical tips. Huge thanks from the Netlas.io team! #Netlas_io_Hints
https://tkcyber.com/index.php/2022/02/23/what-is-netlas-and-how-to-use-it-in-2022/
https://tkcyber.com/index.php/2022/02/23/what-is-netlas-and-how-to-use-it-in-2022/
🔥2👍1
Here is an interesting review of Netlas.io containing examples of use and comparison with shodan.io, censys.io, fofa.so, zoomeye.org and others
https://www.hackread.com/netlas-io-a-new-atlas-of-internet/
https://www.hackread.com/netlas-io-a-new-atlas-of-internet/
Hackread - Latest Cybersecurity, Tech, AI, Crypto & Hacking News
Netlas.io: A new atlas of the Internet
Follow us on Twitter @Hackread - Facebook @ /Hackread
🔥4
This media is not supported in your browser
VIEW IN TELEGRAM
There were several requests to make a light theme. We hope you'll enjoy it!
❤1👏1
Forward DNS datasets have been updated today. More than 2,1 billion of records!
https://app.netlas.io/datastore/
https://app.netlas.io/datastore/
Meet the Birthday Netlas.io Release! Brand new Whois search tool, advanced support for popular IoT protocols, redesigned search examples followed by help articles and much more.
https://netlas.io/blog/tpost/ejektipnj1-netlas-v0160-release-notes
https://netlas.io/blog/tpost/ejektipnj1-netlas-v0160-release-notes
🎉8
Did you know that Netlas IP whois database is also available through the API and CLI?
More importantly, you can purchase and download complete Netlas IP whois data collection from our datastore.
https://app.netlas.io/datastore/product/40/
More importantly, you can purchase and download complete Netlas IP whois data collection from our datastore.
https://app.netlas.io/datastore/product/40/
👍4
High-profile vulnerabilities in PLC and HMI devices by AutomationDirect (CVE-2022-2003 - CVE-2022-2006) as seen on http://Netlas.io. The United States is the most affected.
#vulnerability_map
#vulnerability_map
👏1
Netlas.io Dorks for finding sensitive IoT Data (adopted and little bit expanded "TOP Shodan Dorks for finding sensitive IoT data" by @0xhunster)
Try these dorks at https://app.netlas.io
Try these dorks at https://app.netlas.io
🔥6👏1
Fresh 1-day vulnerabilities in VMware Workspace ONE Access, Identity Manager и vRealize Automation (CVE-2022-31656 - CVE-2022-31659) as seen on Netlas.io. CVSSv3 - 9,8!
http.body:"VMware vRealize Automation Appliance" OR http.favicon.hash_sha256:7eef5dc4dc1055c6e3e479a8ab95efbe0a11660fa7152d1163377bca7d2b8428
http.body:"VMware vRealize Automation Appliance" OR http.favicon.hash_sha256:7eef5dc4dc1055c6e3e479a8ab95efbe0a11660fa7152d1163377bca7d2b8428
🔥3🤩2👏1
Netlas (sub)domain search will be available through OWASP Amass soon.
https://github.com/OWASP/Amass/pull/818
https://github.com/OWASP/Amass/pull/818
GitHub
Added Netlas as a datasource and removed IPv4Info by shelld3v · Pull Request #818 · OWASP/Amass
In-depth Attack Surface Mapping and Asset Discovery - Added Netlas as a datasource and removed IPv4Info by shelld3v · Pull Request #818 · OWASP/Amass
🔥4👍2❤1
We have significantly improved Netlas Domain Resolver. The latest resolve brings much better quality 💪More than 2 billion domains resolved 🌎
Did you know google.com has more than 500 A-records?
https://app.netlas.io/domains/?q=domain%3Agoogle.com&page=1&indices=
Did you know google.com has more than 500 A-records?
https://app.netlas.io/domains/?q=domain%3Agoogle.com&page=1&indices=
👏2
Here is an interesting article by Rapid7 about CVE-2022-36804 (scored 8,8) related to Bitbucket Server:
https://attackerkb.com/topics/iJIxJ6JUow/cve-2022-36804/rapid7-analysis
And here is a good example of Netlas.io search query using versions for this CVE:
https://app.netlas.io/responses/?q=tag.atlassian_bitbucket.version%3A%5B7.6%20TO%207.6.17%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B7.17%20TO%207.17.10%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B7.21%20TO%207.21.4%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.0%20TO%208.0.3%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.1%20TO%208.1.3%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.2%20TO%208.2.2%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.3%20TO%208.3.1%5D&page=1&indices=
https://attackerkb.com/topics/iJIxJ6JUow/cve-2022-36804/rapid7-analysis
And here is a good example of Netlas.io search query using versions for this CVE:
https://app.netlas.io/responses/?q=tag.atlassian_bitbucket.version%3A%5B7.6%20TO%207.6.17%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B7.17%20TO%207.17.10%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B7.21%20TO%207.21.4%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.0%20TO%208.0.3%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.1%20TO%208.1.3%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.2%20TO%208.2.2%5D%20OR%20tag.atlassian_bitbucket.version%3A%5B8.3%20TO%208.3.1%5D&page=1&indices=
AttackerKB
CVE-2022-36804 | AttackerKB
Multiple API endpoints in Atlassian Bitbucket Server and Data Center 7.0.0 before version 7.6.17, from version 7.7.0 before version 7.17.10, from version 7.18.…
⚡2👍2🔥2
About 33% of the current scan completed. This time we have added support for DNS protocol (both TCP and UDP) and two more industrial protocols: Modbus and Siemens S7 communications.
https://app.netlas.io/responses/?q=protocol%3A(modbus%20OR%20s7%20OR%20dns)&page=1&indices=43
https://app.netlas.io/responses/?q=protocol%3A(modbus%20OR%20s7%20OR%20dns)&page=1&indices=43
🔥4⚡1
An interesting article on SecureList about Schneider Electric controllers vulnerabilities CVE-2020-28212, CVE-2021-22779 and flawed patch. More than 600 industrial controllers possibly affected according to our latest scan (~2/3 completed).
Here is the link to Netlas.io search: https://app.netlas.io/responses/?page=1&q=modbus.mei_response.objects.product_code.keyword%3A%2F%28BME%20%28H%7CP%29%29%7C%28BMX%20P34%29.%2A%2F
Here is the link to Netlas.io search: https://app.netlas.io/responses/?page=1&q=modbus.mei_response.objects.product_code.keyword%3A%2F%28BME%20%28H%7CP%29%29%7C%28BMX%20P34%29.%2A%2F
Securelist
Schneider Electric UMAS protocol vulnerabilities
Kaspersky ICS CERT report on vulnerabilities in Schneider Electric's engineering software that enables UMAS protocol abuse.
🔥3🤯2👍1
Dear Netlas.io users!
The Alpha testing phase is close to completion. There will be a major update to Netlas.io in a few days. This update opens the Beta phase. We believe that the core features of Netlas.io are stable and ready to use. We will continue to develop the service, but now it is extremely important for us to move on to monetization. So, the upcoming update will bring a subnoscription system. 💵📈
Read more about upcoming update: https://netlas.io/blog/tpost/xv2e7alik1-upcoming-beta-release
The Alpha testing phase is close to completion. There will be a major update to Netlas.io in a few days. This update opens the Beta phase. We believe that the core features of Netlas.io are stable and ready to use. We will continue to develop the service, but now it is extremely important for us to move on to monetization. So, the upcoming update will bring a subnoscription system. 💵📈
Read more about upcoming update: https://netlas.io/blog/tpost/xv2e7alik1-upcoming-beta-release
🔥2🎉2👍1
Netlas goes to the Beta testing phase.
We added new search tools - host summary and domain whois search, new protocols, privacy detection features and much more. But the general novation is a subnoscription system.
Read more: https://netlas.io/blog/tpost/ol3n2r3b41-netlas-v0180-release-notes
We added new search tools - host summary and domain whois search, new protocols, privacy detection features and much more. But the general novation is a subnoscription system.
Read more: https://netlas.io/blog/tpost/ol3n2r3b41-netlas-v0180-release-notes
🎉3❤1
Fortinet appliances are in the spotlight today!
Authentication Bypass Technical Deep Dive (CVE-2022-40684) by Horizon3.ai: https://tinyurl.com/yc82pwut
Fortinet on Netlas.io:
👉🏼 Dork: tag.name:(fortinet OR fortigate_vpn)
👉🏼 Link to search: https://app.netlas.io/responses/?q=tag.name%3A(fortinet%20OR%20fortigate_vpn)&page=1&indices=
Authentication Bypass Technical Deep Dive (CVE-2022-40684) by Horizon3.ai: https://tinyurl.com/yc82pwut
Fortinet on Netlas.io:
👉🏼 Dork: tag.name:(fortinet OR fortigate_vpn)
👉🏼 Link to search: https://app.netlas.io/responses/?q=tag.name%3A(fortinet%20OR%20fortigate_vpn)&page=1&indices=
🔥5
ConnectWise Recover and R1Soft Server Backup Manager RCE bug (CVE-2022-36537) disclosure: https://tinyurl.com/ydresab7
They say: “there has been no evidence of exploitation in the wild”, but it is likely a matter of hours or days.
About 5,600 instances potentially affected.
Server Backup Manager on Netlas.io:
👉🏼 Dork: http.body:(("zk.wcs" OR "zk.wpd") AND ("Server Backup")) OR http.favicon.hash_sha256:b7b4ce41a9cc86e1923997f5324b476686c953e87e22424e8375eddeb65e63ec
👉🏼 Search link: https://app.netlas.io/responses/?q=http.body%3A…
They say: “there has been no evidence of exploitation in the wild”, but it is likely a matter of hours or days.
About 5,600 instances potentially affected.
Server Backup Manager on Netlas.io:
👉🏼 Dork: http.body:(("zk.wcs" OR "zk.wpd") AND ("Server Backup")) OR http.favicon.hash_sha256:b7b4ce41a9cc86e1923997f5324b476686c953e87e22424e8375eddeb65e63ec
👉🏼 Search link: https://app.netlas.io/responses/?q=http.body%3A…
Huntress
ConnectWise/R1Soft Server Backup Manager Remote Code Execution & Supply Chain Risks | Huntress
Huntress has validated an initial report for an authentication bypass and sensitive file leak present in the Java framework “ZK”, used within the ConnectWise R1Soft software Server Backup Manager SE.
🔥3🕊1
The OpenSSL punycode vulnerability (CVE-2022-3602): Overview, detection, exploitation, and remediation by Datadog Security Labs
OpenSSL 3.0.0 - 3.0.6 on Netlas.io:
👉🏼 Dork: tag.openssl.version:(>=3.0.0 AND <3.0.7)
👉🏼 Link to search: https://tinyurl.com/3d94dt6y
OpenSSL 3.0.0 - 3.0.6 on Netlas.io:
👉🏼 Dork: tag.openssl.version:(>=3.0.0 AND <3.0.7)
👉🏼 Link to search: https://tinyurl.com/3d94dt6y
👍2⚡1