Beyond vulnerability scanning: Enhancing attack surface management for more proactive security

Enumerating Subdomains with

Both defenders and attackers have a keen interest in understanding the attack surface for an organization — defenders must understand what is exposed so they can prioritize what to maintain and monitor — attackers must understand what is reachable so they can decide which services are available to compromise.

Building for Linuxes Old Enough to Buy a Pack of Smokes

At Randori, our automated attack platform emulates a realistic adversary. Real adversaries will often take advantage of targets of opportunity discovered on a network, even if those targets are not directly related to an objective.

Avoid the Scramble: Reflections on CVE-2020-5902

If you were one of the many folks this weekend trying to figure out if you had a F5 BIP, if so how many, if the administration interface was exposed to the internet, if you knew where the logs were going and if you had enough visibility to know if it was being actively exploited you got pulled into a scramble and frankly…  You f*cke up a long time ago.

CVE-2020-2021: Post Exploit Analysis

The Randori Attack Team has successfully developed a POC for CVE-2020-2021 and has been able to confirm the severity of the vulnerability in local test and production environments. 

“Side-Loading” Software in a Running Docker Container

At Randori, one way our automated attack platform operates is by bridging docker containers into remote network environments. The actual operation of this system is outside the scope of this article, but in short, a series of network tunnels within network tunnels provides us with a container with network traffic fully (and only) emerging into a remote network.

Get an Attacker’s view of your organization

Randori is building the world’s most authentic, automated attack platform to help defenders train like the adversary. Based on technology used to penetrate some of the world’s largest and most secure organizations, Randori enables security leaders to regain control of their attack surface, prioritize like an attacker, and practice how they fight.