{"id":15302,"date":"2021-03-14T16:17:57","date_gmt":"2021-03-14T23:17:57","guid":{"rendered":"https:\/\/xerosecurity.com\/wordpress\/?page_id=15302"},"modified":"2024-09-17T14:22:15","modified_gmt":"2024-09-17T21:22:15","slug":"threat-intel-add-on-v1-0-documentation","status":"publish","type":"page","link":"https:\/\/sn1persecurity.com\/wordpress\/threat-intel-add-on-v1-0-documentation\/","title":{"rendered":"Threat Intel Add-on v1.0 Documentation"},"content":{"rendered":"<p>Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases with the new Threat Intel Add-on for Sn1per Professional!<\/p>\n<h4>Features<\/h4>\n<hr \/>\n<ul>\n<li>Quickly search for the latest CVE\u2019s, exploits and vulnerabilities easily<\/li>\n<li>Search local NMap scripts and Metasploit modules easily<\/li>\n<li>Stay up-to-date on emerging threats, vulnerabilities, news and exploits with over 20+ hand picked RSS feeds<\/li>\n<li>Perform OSINT and reconnaissance on any target IP or domain name, using built-in recon and Google dork links<\/li>\n<li>Join the top security servers on Slack and Discord to gather and share community based intelligence<\/li>\n<\/ul>\n<h4>Usage<\/h4>\n<hr \/>\n<h5>Search for NMap or Metasploit Exploits<\/h5>\n<p>To search for NMap or Metasploit scripts and exploits, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Enter a keyword to search for in the &#8220;Search&#8221; input box (ie. citrix)<\/li>\n<li>Click the &#8220;Search&#8221; button to start the search<\/li>\n<\/ol>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15304 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1.png\" alt=\"\" width=\"1653\" height=\"293\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1.png 1653w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-800x142.png 800w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-300x53.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-1024x182.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-768x136.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-1536x272.png 1536w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1-400x71.png 400w\" sizes=\"auto, (max-width: 1653px) 100vw, 1653px\" \/><\/a><\/p>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15303 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b.png\" alt=\"\" width=\"1446\" height=\"739\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b.png 1446w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel1b-800x409.png 800w\" sizes=\"auto, (max-width: 1446px) 100vw, 1446px\" \/><\/a><\/p>\n<h5>Viewing Threat Intel RSS Feeds<\/h5>\n<p>To view the latest threat intel rss feeds, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Select any of the RSS feeds from the &#8220;RSS&#8221; menu<\/li>\n<\/ol>\n<p><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15305 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2.png\" alt=\"\" width=\"1429\" height=\"1208\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2.png 1429w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel2-800x676.png 800w\" sizes=\"auto, (max-width: 1429px) 100vw, 1429px\" \/><\/a><\/p>\n<h5>Perform Recon Using 3rd Party Online Tools<\/h5>\n<p>To perform recon against a domain name, company or IP address, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Enter the keyword to search for in the &#8220;Search&#8221; input box (ie. hackerone.com)<\/li>\n<li>Click on any of the recon or Google dork links from the &#8220;Recon Links&#8221; and &#8220;Google Dorks&#8221; menus<\/li>\n<\/ol>\n<h4><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15307 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3.png\" alt=\"\" width=\"1445\" height=\"1123\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3.png 1445w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-800x622.png 800w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-300x233.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-1024x796.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-768x597.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel3-400x311.png 400w\" sizes=\"auto, (max-width: 1445px) 100vw, 1445px\" \/><\/a><\/h4>\n<h5>Searching For Exploits and CVE&#8217;s Using 3rd Party Online Tools<\/h5>\n<p>To search for exploits and CVE&#8217;s using 3rd party online tools, do the following:<\/p>\n<ol>\n<li>Click on any workspace from the Workspace Navigator<\/li>\n<li>Scroll down and click &#8220;Threat Intel&#8221; menu to access the Threat Intel Add-on<\/li>\n<li>Enter the keyword to search for in the &#8220;Search&#8221; input box (ie. proxylogon)<\/li>\n<li>Click on any of the exploit links from the &#8220;Exploit Links&#8221; menu<\/li>\n<\/ol>\n<h4><a href=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-15308 size-full\" src=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4.png\" alt=\"\" width=\"1453\" height=\"715\" srcset=\"https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4.png 1453w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-800x394.png 800w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-300x148.png 300w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-1024x504.png 1024w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-768x378.png 768w, https:\/\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2021\/03\/Sn1per-Professional-v9.0-threat-intel4-400x197.png 400w\" sizes=\"auto, (max-width: 1453px) 100vw, 1453px\" \/><\/a><\/h4>\n<h4><a href=\"https:\/\/sn1persecurity.com\/wordpress\/documentation\/\">Back to Main Documentation<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Stay up-to-date with the latest emerging security threats, vulnerabilities, data breaches and exploit releases with the new Threat Intel Add-on for Sn1per Professional! [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"footnotes":""},"class_list":["post-15302","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack_shortlink":"https:\/\/wp.me\/PdnW96-3YO","jetpack_likes_enabled":true,"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":17839,"url":"https:\/\/sn1persecurity.com\/wordpress\/add-ons\/","url_meta":{"origin":15302,"position":0},"title":"Sn1per Modules","author":"xer0dayz","date":"April 1, 2022","format":false,"excerpt":"[vc_row][vc_column width=\"1\/4\"][vc_single_image image=\"16636\" img_size=\"200x100\" alignment=\"center\" onclick=\"custom_link\" img_link_target=\"_blank\" css=\".vc_custom_1648947685813{padding-top: 25px !important;}\" link=\"https:\/\/sn1persecurity.com\/wordpress\/product\/command-execution-add-on-v2\/\"][\/vc_column][vc_column width=\"3\/4\"][vc_column_text] Command Execution Module Easily manage Sn1per Professional instances from the web interface without ever touching the command line. Find out more. [\/vc_column_text][vc_separator][\/vc_column][\/vc_row][vc_row][vc_column width=\"1\/4\"][vc_single_image image=\"16497\" img_size=\"200x100\" alignment=\"center\" onclick=\"custom_link\" img_link_target=\"_blank\" css=\".vc_custom_1648947827793{padding-top: 25px !important;}\" link=\"https:\/\/sn1persecurity.com\/wordpress\/product\/masspwn-add-on-v1-0\/\"][\/vc_column][vc_column width=\"1\/4\"][vc_column_text] MassPwn Module Pop shells and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16011,"url":"https:\/\/sn1persecurity.com\/wordpress\/masspwn-add-on-v1-0-documentation\/","url_meta":{"origin":15302,"position":1},"title":"MassPwn Add-on v1.0 Documentation","author":"xer0dayz","date":"July 13, 2021","format":false,"excerpt":"Leverage the full power of Metasploit with the new \"MassPwn Add-on\" for Sn1per Professional v9.0. Features Simple GUI for Metasploit to set common options and settings Import all vulnerability scan data into Sn1per Professional automatically Launch single or multiple Metasploit modules and exploits in-line Launch auxiliary scans and exploits against\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":34182,"url":"https:\/\/sn1persecurity.com\/wordpress\/documentation\/metasploit-integration\/","url_meta":{"origin":15302,"position":2},"title":"Metasploit Integration","author":"xer0dayz","date":"September 25, 2024","format":false,"excerpt":"Configuration To configure Sn1per to use the appropriate IP\/port for reverse Metasploit connections, edit your Sn1per configuration template under the \/sniper\/conf\/ directory: # METASPLOIT SCANNER CONFIG MSF_LHOST=\"127.0.0.1\" MSF_LPORT=\"4444\" METASPLOIT_IMPORT=\"1\" METASPLOIT_EXPLOIT=\"1\" MSF_LEGACY_WEB_EXPLOITS=\"1\" This will configure Sn1per to set the LHOST and LPORT values for all exploits and payloads to connect back\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":17857,"url":"https:\/\/sn1persecurity.com\/wordpress\/use-cases\/","url_meta":{"origin":15302,"position":3},"title":"Use Cases","author":"xer0dayz","date":"April 2, 2022","format":false,"excerpt":"[vc_row][vc_column][vc_column_text] Use Cases Whether you're looking to conduct simple reconnaissance or identify vulnerabilities in systems and applications, Sn1per offers the capabilities you need in one place. [\/vc_column_text][\/vc_column][\/vc_row][vc_row][vc_column width=\"1\/2\"][vc_column_text] Attack Surface Management Discover the attack surface and prioritize risk with our continuous Attack Surface Management platform. [\/vc_column_text][\/vc_column][vc_column width=\"1\/2\"][vc_column_text] Automated OSINT &\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":17887,"url":"https:\/\/sn1persecurity.com\/wordpress\/integrations\/","url_meta":{"origin":15302,"position":4},"title":"Sn1per Integrations","author":"xer0dayz","date":"April 4, 2022","format":false,"excerpt":"[vc_row][vc_column][vc_tta_accordion style=\"modern\" color=\"black\" active_section=\"0\" collapsible_all=\"true\"][vc_tta_section title=\"Nessus\" tab_id=\"1649081552603-7b783b8b-6df1\"][vc_column_text]Scan for the latest vulnerabilities using Nessus and import detailed vulnerability data and reports into Sn1per Professional. Find out more[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\"OpenVAS\/GVM\" tab_id=\"1649081552603-d65d7c3f-749b\"][vc_column_text]Scan for the latest vulnerabilities using OpenVAS\/GVM 21.x and import detailed vulnerability reports and data into Sn1per Professional. Find out more[\/vc_column_text][\/vc_tta_section][vc_tta_section title=\"Burpsuite Professional\"\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sn1persecurity.com\/wordpress\/wp-content\/uploads\/2022\/09\/Sn1per-Professional-Elite-Bundle-White.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":15439,"url":"https:\/\/sn1persecurity.com\/wordpress\/workspace-report-documentation\/","url_meta":{"origin":15302,"position":5},"title":"Workspace Report Documentation","author":"xer0dayz","date":"February 9, 2022","format":false,"excerpt":"About The Workspace Report provides high level stats on each workspace and allows easy sorting, filtering and viewing of all assets within a workspace. To view the Workspace Report for a specific workspace, click on the workspace name that you would like to view from the Workspace Navigator. Top Menu\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"sn1per-professional-v9.0-attack-surface-discovery2","src":"https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/xerosecurity.com\/wordpress\/wp-content\/uploads\/2021\/02\/sn1per-professional-v9.0-attack-surface-discovery2.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/15302","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/comments?post=15302"}],"version-history":[{"count":6,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/15302\/revisions"}],"predecessor-version":[{"id":33732,"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/pages\/15302\/revisions\/33732"}],"wp:attachment":[{"href":"https:\/\/sn1persecurity.com\/wordpress\/wp-json\/wp\/v2\/media?parent=15302"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}