Spring update

Vega 1.0

A 1.0 RC build has been available for download for a couple of weeks. We recommend that beta users download the newest version of Vega at:

http://www.subgraph.com/vega_download.php

Note: If you were using the Vega beta, you need to clear your workspace (back it up if necessary) before starting the new version. Once the new version is installed, reset both perspectives to ensure that the UI layout is refreshed.

We’re still working on a few things, so reluctant to call this 1.0 – but it’s close. Try it. Report any bugs. It’s also in Kali Linux.

Documentation has Moved

We’ve moved the documentation and bug reporting over to Github. No more trac.

The Vega Wiki is now here:

https://github.com/subgraph/Vega/wiki

Be sure to check out the user guides:

Bug Reports & Feature Requests via Github Issues

Bug reports and feature requests should also be reported via Github:

https://github.com/subgraph/Vega/issues

Northsec, ConFoo, and the Vega 1.0 release

Subgraph sponsoring Northsec

Subgraph is pleased to announce we are a sponsor of Northsec, a CTF to be held in Montreal April 5-7.

Image

Vega 1.0 Release: March 1, 2013

We will be presenting at ConFoo next week to announce the release of of Vega 1.0. Be sure to catch our presentation on Friday, March 1, at 2:30pm.

vegaLogo_small

Some of the features in the 1.0 release include:

  • Active proxy scanner
  • Greatly improved detections
  • Greatly improved support for authenticated scanning
  • API enhancements
  • HTTP message viewer enhancements

Some of the features in the 1.0 release are summarized (with screenshots) in our Countermeasure 2012 presentation.

The Countermeasure 2012 presentation can be downloaded here.

A more in-depth walk-through can be found in issue #9 of HITB Magazine:

http://magazine.hackinthebox.org/issues/HITB-Ezine-Issue-009.pdf

More soon.

Black Hat Arsenal 2012

Writing this post from a taxi in Montreal on its way to the airport. Hugo and I are headed to Black Hat 2012 / Defcon in Las Vegas. We’ll be demonstrating the pre-release version of Vega at Black Hat Arsenal on the 25 and 26, pod #5 at 3:30pm on both days.

We’ll show some new features and  have freshly cut stickers to give away.

Come say hello!

.

 

 

Vega Module Development: Highlighting in Requests and Responses

We’ve just added a feature that helps users better understand scan results. For each alert, Vega can now more precisely pinpoint to the user where and what exactly it found.

Some background

Vega vulnerability checks are written in Javascript. Anyone can write one. These modules are run both passively and actively as Vega finds content it wants to scan.

Vega modules report findings by generating alerts. In doing so, they save the relevant HTTP request and response objects for review by the user. Within the alert is a link to view these saved HTTP messages in the message viewer (see below).

Request link in a alert

 

For the user

The module developer can now specify an interesting string within the HTTP message. When opened through the link in the alert shown above, the Vega message viewer will scroll to the matching location and highlight the substring, making it immediately apparent to the user what the module found. Screen below:

Module development: response highlighting

 

For the module developer

The API support for this is pretty simple, there are two methods that can be called from the context object:

ctx.addStringHighlight()

ctx.addRegexHighlight()

If you grab the code from our repository, we’ve added this functionality to two modules (vinfo-paths.js and vinfo-feeds.js). These examples show how simple it is:

API support

We’ll be updating all existing and new modules so that they use this feature. We’ll also be adding UI support for viewing multiple matches.

Let us know what you think.

Happy Birthday Vega

Vega Launch at FISL12 – Photo by Christian Guerreiro

One year ago today we launched the Vega beta at FISL 12. A lot has happened in the past year.

  • Vega was included in BackTrack 5R1, the security testing Linux distribution downloaded millions of times.
  • We have received lots of great feedback from our beta users.
  • We fared well (for a beta!) in a rigorous comparison of many commercial and free/open source security tools.
  • We were at OSCON, AppSecUSA, Confoo, and threw the best REcon to date.
  • Vega was the topic of a lengthy article in issue #33 of Insecure Magazine. Some of the new features coming are described there in detail.

We’ve also been busy doing a lot of services: penetration tests, code reviews, reverse engineering. We do this to help fund the development of Vega.

So we’re now excited to announce that we’ve been working on a new release. The release will fix many bugs, and some of the new features include:

Automating Web Application Login

Vega now allows you to store authentication credentials as an ‘identity’ so that Vega can log in automatically during a scan. This includes basic, digest, and NTLM credentials.

For authenticating using forms, it is possible to associate stored login requests seen by the proxy with an identity. Vega can then replay those to log in when starting a scan.

Vega supports creation of ‘identities’ for scanning with authentication.

 

Adding a Login Request to a Macro

In the screenshot below, the user simply logs into the application through the Vega proxy, and then selects the stored login request during the creation of the macro. Binding this to an identity and then using the identity during a scan will let the scanner log itself in automatically prior to starting a scan.

Selecting requests for the macro identity.

 

Message Viewer Improvements

We’ve also cleaned up the message viewer, making the rendering nicer and adding small touches like searching (Ctrl-F) and menu-based copy and paste (right mouse click menu). For the module developer, it will be possible to tell the message viewer what to highlight and where to scroll to when a request is accessed through an alert.

Cleaner rendering in message viewer. Search, copy/paste, module-specified highlighting.

 

Module Refresh

Finally, we are doing a complete module refresh. This means existing modules will be made more reliable and efficient. And we have several new modules under development.

What’s next?

We don’t have a fixed date for the release – but it will be soon. You can always build from source if you want access to some of these features sooner. They’re in the develop branch of our github repository. Contact us if you’d like to help us test new features and we’ll make a special build if you are using Windows or OS X. Talk to us on IRC (freenode) in #subgraph.

Finally

We’ll be presenting Vega at Black Hat Arsenal 2012 in Las Vegas. Be sure to stop by and say hello if you’re going to be there.

Subgraph at Hackfest

The third edition of the new Hackfest occurred over this past November 4th and 5th.

Hackfest is a security conference held annually in Québec City (Ste-Foy, to be precise). The Subgraph crew has been fortunate enough to have been there for all of the past three events. What makes Hackfest special is the close connection to Université Laval and the well put-together hacking games – specifically the main CTF. This year the CTF was packed – at least one group that wanted to register at the last minute was denied due to a lack of space.

Félicitations to this year’s CTF winner, AmishSecurity (Montrealers, friends, and MTLSEC regulars). They had some good competition.

This year there were many familiar faces, and many more unfamiliar. What was most exciting for us was seeing the beta version of Vega being used by competitors in both hacking competitions. Just walking around the room we saw both the scanner and the proxy in action, for example:

1. During the first challenge, which involved each team maintaining operation of several network services and attacking the services of the opposing team, a player ran a Vega scan and found that one of the webservers permitted HTTP PUTs to /. This was then exploited to fill the partition and knock out the www service.

2. During the CTF, a directory traversal/file include vulnerability detected by a Vega module was confirmed as exploitable using the request replay feature and then used to access one of the flags on the webserver.

At one point, we were asked by a player if we’d put Vega content on a webserver during the first challenge. It wasn’t us, and we still don’t know who this was, but it made our evening – so thanks.

Finally, we had a chance to hand out plenty of Vega stickers. With the beta out, we’re now hard at work on the next version of Vega. I’ll be presenting some of the new features at PHP Quebec on Dec 1. More on this soon.

Much thanks to the organizers. We had fun, and we’ll be back for Hackfest 2012.