I started to play with a nice reconnaissance tool that could be helpful in many cases - offensive as well as defensive. IVRE [1] (DRUNK in French) is a tool developed by the CEA, the Alternative Energies and Atomic Energy Commission in France. Its a network reconnaissance framework that includes:
- Passive recon features (via flow analysis coming from Bro or Nfdump
- Fingerprinting analysis
- Active recon (via Nmapor Zmap)
- Import tools (from Nmap or Masscan)
I deployed this tool and feed it with attacker" />
Very useful to find compromized hosts which delivermalware! The web interface provides a powerful search feature. Examples:
- Show me all IP addresses from Russia, that have a port 27017 open (MongoDB)
- Show me the network devices" />
Getting more knowledge about your attackers is always good. IVRE can help you in this way. This is avery powerful framework that will help you to build your own small Shodan. Happy hunting!
Xavier Mertens (@xme)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
ISC Handler - Freelance Security Consultant
PGP Key