Randori is thrilled to announce that we have received our official ISO 27001 certification. The ISO27001 Certification is the first of many steps we're taking to demonstrate our commitment to ensure that our security and privacy standards meet and exceed our customer's high expectations.
If you were one of the many folks this weekend trying to figure out if you had a F5 BIP, if so how many, if the administration interface was exposed to the internet, if you knew where the logs were going and if you had enough visibility to know if it was being actively exploited you got pulled into a scramble and frankly… You f*cke up a long time ago.
At Randori, one way our automated attack platform operates is by bridging docker containers into remote network environments. The actual operation of this system is outside the scope of this article, but in short, a series of network tunnels within network tunnels provides us with a container with network traffic fully (and only) emerging into a remote network.
The second challenge I made for the https://derpcon.io CTF (read about the first challenge here) was a medium difficulty challenge starting at https://derp.randori.com. The idea was to utilize some modern reconnaissance techniques and hide in plain sight, similar to system configurations I have seen in the past.
I had the opportunity to make a couple challenges for the https://derpcon.io/ CTF. I had fun making the challenges, so I figured I would drop some quick notes here about how I would have gone about solving them.
It’s difficult to put into words just how excited I am to be able to share this news — we just raised $20M in series A funding led by Harmony Partners and our existing investors Accomplice, .406 Ventures and Legion Capital.
At Randori, we recommend assessing risk by evaluating your network the same way an attacker would. But, what does that actually mean, and how does an attacker lens differ from a traditional defenders’ approach?
Today we’re thrilled to officially announce general availability of Randori Recon, the first phase of our automated attack platform. With only an email, Randori Recon can stack rank your most tempting targets for an adversary.
Get an Attacker’s view of your organization
Randori is building the world’s most authentic, automated attack platform to help defenders train like the adversary. Based on technology used to penetrate some of the world’s largest and most secure organizations, Randori enables security leaders to regain control of their attack surface, prioritize like an attacker, and practice how they fight.