How Just-Metadata Reinvents IP Analysis

By Red Siege | March 21, 2024

Tool developed by: Chris Truncer

Cracking the Code with Just-Metadata

Imagine trying to solve a giant puzzle where each piece is hidden in a massive digital world. That’s what dealing with cybersecurity data can feel like. But here comes Just-Metadata, a cool tool that changes the game for people who protect our computer networks, like cybersecurity pros and CISA’s. It turns the tricky task of looking through tons of data into something way simpler. Just-Metadata helps you see how all the pieces of data are connected, kind of like finding hidden paths on a map. It’s not just about collecting tons of info; it’s about figuring out what it all means so you can make your computer networks stronger.

Discovering Hidden Links

Just-Metadata is like a detective’s magnifying glass for the internet. It helps find secret paths between computers, websites, and user accounts that you wouldn’t notice at first glance. By looking at the data’s metadata (that’s the data about the data!), this tool can show you how everything in your network fits together. This is super important for finding weak spots in the network where bad guys might try to sneak in. With Just-Metadata, people who work to keep our digital world safe get an awesome tool to help them see the whole picture and keep our information secure.

Using Just-Metadata

 

 

To use Just-Metadata, the first thing you will do is load into the tool a list of IPs that Just-Metadata will analyze. This can be done with single IPs on a new line in a text file, or using CIDR notation.

 

Once IPs are loaded into the tool, you can tell Just-Metadata to start gathering data from various sources (a subset of what is supported is shown below).

 

Once the various sources have finished gathering all the data, you can analyze the data and search for various trends, a subset of which are shown below.

 

An example output could look like the following:

 

Learn More

Just-Metadata is just the beginning. If you’re intrigued by the possibilities of peeling back the layers of your network and uncovering the secrets within, there’s more where that came from. Check out Red Siege’s toolbox for an arsenal of free cybersecurity tools. If you’re looking to dive deeper, have questions, or just want to connect with fellow cybersecurity enthusiasts, join us on our Discord.

Adventures in Shellcode Obfuscation! Part 4: RC4 with a Twist

By Red Siege | July 8, 2024

by Mike Saunders, Principal Security Consultant This blog is the fourth in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the series […]

Learn More
Adventures in Shellcode Obfuscation! Part 4: RC4 with a Twist

Adventures in Shellcode Obfuscation! Part 3: Encryption

By Red Siege | July 1, 2024

By Mike Saunders, Principal Security Consultant   This blog is the third in a series of blogs on obfuscation techniques for hiding shellcode. You can find the rest of the […]

Learn More
Adventures in Shellcode Obfuscation! Part 3: Encryption

Phone Switch Labs CTF – Walk-Through

By Red Siege | June 26, 2024

by Douglas Berdeaux, Senior Security Consultant CTF redsiege.com/phoneswitch Getting Started Phone phreaking is the practice of exploring and hacking telephones, telephone switches, telephone test equipment, and physically exploring the telephone […]

Learn More
Phone Switch Labs CTF – Walk-Through

Find Out What’s Next

Stay in the loop with our upcoming events.