How Just-Metadata Reinvents IP Analysis

By Red Siege | March 21, 2024

Tool developed by: Chris Truncer

Cracking the Code with Just-Metadata

Imagine trying to solve a giant puzzle where each piece is hidden in a massive digital world. That’s what dealing with cybersecurity data can feel like. But here comes Just-Metadata, a cool tool that changes the game for people who protect our computer networks, like cybersecurity pros and CISA’s. It turns the tricky task of looking through tons of data into something way simpler. Just-Metadata helps you see how all the pieces of data are connected, kind of like finding hidden paths on a map. It’s not just about collecting tons of info; it’s about figuring out what it all means so you can make your computer networks stronger.

Discovering Hidden Links

Just-Metadata is like a detective’s magnifying glass for the internet. It helps find secret paths between computers, websites, and user accounts that you wouldn’t notice at first glance. By looking at the data’s metadata (that’s the data about the data!), this tool can show you how everything in your network fits together. This is super important for finding weak spots in the network where bad guys might try to sneak in. With Just-Metadata, people who work to keep our digital world safe get an awesome tool to help them see the whole picture and keep our information secure.

Using Just-Metadata

 

 

To use Just-Metadata, the first thing you will do is load into the tool a list of IPs that Just-Metadata will analyze. This can be done with single IPs on a new line in a text file, or using CIDR notation.

 

Once IPs are loaded into the tool, you can tell Just-Metadata to start gathering data from various sources (a subset of what is supported is shown below).

 

Once the various sources have finished gathering all the data, you can analyze the data and search for various trends, a subset of which are shown below.

 

An example output could look like the following:

 

Learn More

Just-Metadata is just the beginning. If you’re intrigued by the possibilities of peeling back the layers of your network and uncovering the secrets within, there’s more where that came from. Check out Red Siege’s toolbox for an arsenal of free cybersecurity tools. If you’re looking to dive deeper, have questions, or just want to connect with fellow cybersecurity enthusiasts, join us on our Discord.

Extend Your Browser

By Red Siege | May 9, 2024

by Ian Briley, Security Consultant In my last blog, I discussed using only a browser for web application testing, emphasizing how useful built-in browser tools like the Inspector and Console […]

Learn More
Extend Your Browser

Introducing Delta Encoder

By Red Siege | April 15, 2024

By Corey Overstreet, Senior Security Consultant Recently, our own Mike Saunders released a novel shellcode obfuscation technique with the tool Jigsaw. If you haven’t checked out the GitHub repository or […]

Learn More
Introducing Delta Encoder

Using Microsoft Dev Tunnels for C2 Redirection

By Red Siege | April 9, 2024

by Justin Palk, Senior Security Consultant   As penetration testers, we’re always on the lookout for new ways to get our command-and-control (C2) traffic out of a client’s network, evading […]

Learn More
Using Microsoft Dev Tunnels for C2 Redirection

Find Out What’s Next

Stay in the loop with our upcoming events.