Is anyone dealing with a large volume of vulnerabilities and getting tired of vulnerability scanners giving mundane results and not explicitly saying what to fix for your environment? We are looking for beta users to try out our MVP; it's all based on open-source too, and we are offering the service for free! There are actual experts with over 20 years of experience who will look through the vulnerabilities and prioritize according to your environment at the end of our MVP to make sure the user doesn't waste more time investigating solutions and can go back to working on their product. Automating is nice, but you do need a human to look through at the end we feel
apologies for hijacking your post OP but I am curious if people flocking to such a post would be interested in being beta users for us too
More scanners aren’t what we need because vendors still can’t meaningfully answer the most important questions:
- Is the vulnerability valid based on the environment it was found in? Solve this and you’ll reduce enterprise vulnerabilities by probably 30-40%.
- What are the compensating controls? Identify these automagically and reduce the vuln risk scores based on what controls are found, you will remove another 30% of vuln work for engineering teams
We don’t need any more scanners. We need better asset and vuln management.
Looks nice. Only critique I would give is the fact that they use public DNS IP's in the examples to scan hosts I know they expect the target audience to know better, but you'd be surprised
Most programs won't pay for scanner output and will require work that demonstrates the impact of the finding, etc. Several programs I've seen actually state that automated scans are out of scope and ask the bounty hunter not to use them. With that said, this may be a good recon tool to hunt for bugs, if its allowed by the target. I am not sure how much better itd be than Qualys or Nessus, etc though.
I like the idea for personal use. I was just looking for something similar the other day and for once I'm happy I don't need to build it.
frantic2821|2 years ago
apologies for hijacking your post OP but I am curious if people flocking to such a post would be interested in being beta users for us too
jollofricepeas|2 years ago
It’s what happens after.
More scanners aren’t what we need because vendors still can’t meaningfully answer the most important questions:
- Is the vulnerability valid based on the environment it was found in? Solve this and you’ll reduce enterprise vulnerabilities by probably 30-40%.
- What are the compensating controls? Identify these automagically and reduce the vuln risk scores based on what controls are found, you will remove another 30% of vuln work for engineering teams
We don’t need any more scanners. We need better asset and vuln management.
arejaytee|2 years ago
NKCSS|2 years ago
alaeddine001|2 years ago
pythonguython|2 years ago
mdaniel|2 years ago
quesera|2 years ago
www.example.com is not a domain name, and AFAICT there is no attempt to enumerate hosts in a domain and scan them all.
alaeddine001|2 years ago
You can do so by adding your domain name generation tool of your choice, or all. The ones supported for now are `subfinder` and `amass`.
Agent Subfinder: https://github.com/Ostorlab/agent_subfinder Agent Amass: https://github.com/Ostorlab/agent_amass
boleary-gl|2 years ago
Be sure to let us know how we can help, and you are welcome to open issues on GitHub or join our Discord if you have questions.
letters90|2 years ago
Usage Instructions seem lacking.
alaeddine001|2 years ago
Updated the readme with the basic commands and referenced another tutorial with in-depth info: https://docs.ostorlab.co/tutorials/run-your-first-scan.html
unknown|2 years ago
[deleted]
yieldcrv|2 years ago
batch12|2 years ago
I like the idea for personal use. I was just looking for something similar the other day and for once I'm happy I don't need to build it.
scoot|2 years ago
retrochameleon|2 years ago