How Just-Metadata Reinvents IP Analysis

By Red Siege | March 21, 2024

Tool developed by: Chris Truncer

Cracking the Code with Just-Metadata

Imagine trying to solve a giant puzzle where each piece is hidden in a massive digital world. That’s what dealing with cybersecurity data can feel like. But here comes Just-Metadata, a cool tool that changes the game for people who protect our computer networks, like cybersecurity pros and CISA’s. It turns the tricky task of looking through tons of data into something way simpler. Just-Metadata helps you see how all the pieces of data are connected, kind of like finding hidden paths on a map. It’s not just about collecting tons of info; it’s about figuring out what it all means so you can make your computer networks stronger.

Discovering Hidden Links

Just-Metadata is like a detective’s magnifying glass for the internet. It helps find secret paths between computers, websites, and user accounts that you wouldn’t notice at first glance. By looking at the data’s metadata (that’s the data about the data!), this tool can show you how everything in your network fits together. This is super important for finding weak spots in the network where bad guys might try to sneak in. With Just-Metadata, people who work to keep our digital world safe get an awesome tool to help them see the whole picture and keep our information secure.

Using Just-Metadata

 

 

To use Just-Metadata, the first thing you will do is load into the tool a list of IPs that Just-Metadata will analyze. This can be done with single IPs on a new line in a text file, or using CIDR notation.

 

Once IPs are loaded into the tool, you can tell Just-Metadata to start gathering data from various sources (a subset of what is supported is shown below).

 

Once the various sources have finished gathering all the data, you can analyze the data and search for various trends, a subset of which are shown below.

 

An example output could look like the following:

 

Learn More

Just-Metadata is just the beginning. If you’re intrigued by the possibilities of peeling back the layers of your network and uncovering the secrets within, there’s more where that came from. Check out Red Siege’s toolbox for an arsenal of free cybersecurity tools. If you’re looking to dive deeper, have questions, or just want to connect with fellow cybersecurity enthusiasts, join us on our Discord.

Using Microsoft Dev Tunnels for C2 Redirection

By Red Siege | April 9, 2024

by Justin Palk, Senior Security Consultant   As penetration testers, we’re always on the lookout for new ways to get our command-and-control (C2) traffic out of a client’s network, evading […]

Learn More
Using Microsoft Dev Tunnels for C2 Redirection

SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access

By Red Siege | April 1, 2024

By: Alex Reid, Current Red Siege Intern   In the April 2018 release of Windows 10 version 1803, Microsoft announced that the Windows OpenSSH client would ship and be enabled […]

Learn More
SSHishing – Abusing Shortcut Files and the Windows SSH Client for Initial Access

Navigating Active Directory Security with EDD

By Red Siege | March 21, 2024

Tool developed by: Chris Truncer   Leverage EDD for Advanced Offensive Strategies EDD serves as a critical tool for offensive security professionals, enhancing domain reconnaissance with .NET efficiency. It facilitates a […]

Learn More
Navigating Active Directory Security with EDD

Find Out What’s Next

Stay in the loop with our upcoming events.