2 min
Metasploit Wrapup 8/4/17
With Hacker Summer Camp 2017 wrapped up and folks now recovering from it, why
not grab a drink and read up on what's new with Metasploit?
Where there's smoke...
At least a few versions
of open source firewall IPFire contain a post-auth RCE vulnerability, and we
(well, you!) now have a module to help exploit that
3 min
SMBLoris: What You Need To Know
What's Up?
Astute readers may have been following the recent news around "SMBLoris" — a
proof-of-concept exploit that takes advantage of a vulnerability in the
implementation of SMB services on both Windows and Linux, enabling attackers to
"kill you softly" with a clever, low-profile application-level denial of
service
(DoS) . This
vulnerability impacts all versions of Windows and Samba (the Linux software that
provides SMB services
3 min
Automation and Orchestration
Exploring SHA-1 (Secure Hash Algorithm)
Synopsis
In computer cryptography, a popular message compress standard is utilized known
as Secure Hash Algorithm (SHA). Its enhanced version is called SHA-1. It has the
ability to compress a fairly lengthy message and create a short message abstract
in response. The algorithm can be utilized along various protocols to ensure
security of the applied algorithm, particularly for Digital Signature Standard
(DSS). The algorithm offers five separate hash functions which were created by
National Sec
3 min
Automation and Orchestration
Triple DES, 3-DES Network Encryptor
Synopsis
Triple Data Encryption Algorithm (3DES) is an advancement of the popular DES
standard. 3DES utilizes symmetric key block cipher. Using three unrelated 64
bit keys, 3DES was created to encrypt 64 bit blocks of data. In DES block,
each key is utilized as an input. Without creating an entire new cryptosystem,
3DES can highlight the apparent defect in DES. Through exerting the algorithm
three times in progression with three unlike keys, 3-DES simply enhances the key
size of DES. As DES
3 min
How Do You Identify Zero-Days and Fileless Malware? Download (the) RAM.
When a tactic becomes less and less effective, it's important to shift
strategies and adapt. With malware
, attackers are doing
exactly that. As preventative measures such as antivirus and endpoint detection
and response continue to improve, it's harder for commodity and even obfuscated
malware to successfully install and persist on target machines unnoticed.
The most effective
4 min
Python
Virtual Machine Automation (vm-automation) repository released
Rapid7 just released a new public repo called vm-automation. The vm-automation
repository is a Python library that encapsulates existing methodologies for
virtual machine and hypervisor automation and provides a platform-agnostic
Python API. Currently, only ESXi and VMWare workstation are supported, but I
have high hopes we will support other hypervisors in time, and we would love to
see contributors come forward and assist in supporting them!
That's awesome. I want to get started now!
Great! I
6 min
Hacking
Building a Car Hacking Development Workbench: Part 3
Welcome back to the car hacking development workbench series. In part two we
discussed how to read wiring diagrams. In part three, we are going to expand on
the workbench by re-engineering circuits and replicate signals used in your
vehicle.
If this is your first time stumbling across this write up, I encourage you to
check out the previous two parts to this series:
Part 1: Constructing a Workbench
Part 2: How to Read Wiring Di
2 min
Introducing InsightAppSec: Cloud-powered Application Security Testing
Rapid7 announces today the launch of InsightAppSec
, the newest product to be
delivered on the Insight platform
.
InsightAppSec combines the power and accuracy of Rapid7's industry-leading and
proven Dynamic Application Security Testing (DAST) engine with the quick
deployment, scalability, and ease-of-use of the Insight platform, enabling
security teams to quickly identify the critical security ga
1 min
InsightVM now available in Japan
InsightVM customers can now choose to store their InsightVM data in Japan. At
Rapid7, we enable customers to comply with policies and preferences by selecting
the region where their data is transmitted, processed, and stored. We're excited
to announce that Japan joins our existing data centers in the United States and
Germany as an option for InsightVM data.
When enabling InsightVM cloud features for the first time, customers will see a
dialog where they can select which region should store the
5 min
Hacking
Building a Car Hacking Development Workbench: Part 2
This is part two of a three-part series. Part one
covered how to
build a development workbench. Part two of this series will cover reading
electrical diagrams and serve as a primer for part three, where we will
re-engineer common circuit types found in vehicles.
Electrical Diagrams & Re-identification
Technically, your bench is complete at this point, and you can connect an OBD-II
to USB conversion device to start interpreting
1 min
Cleaning House: Maintaining an accurate and relevant vulnerability management program
When Nexpose launched in the early
2000s, technology was vastly different from the world we live in today: most
people connected to the internet over dial-up modems, personal computers were
shared within the household, and televisions were still set-top boxes.
Technology has evolved dramatically since then, and Rapid7's vulnerability
management solutions
have evolved to
meet the needs of secur
10 min
Hacking
Building a Car Hacking Development Workbench: Part 1
Introduction
There is a vast body of knowledge hiding inside your car. Whether you are an
auto enthusiast, developer, hobbyist, security researcher, or just curious about
vehicles, building a development bench can be an exciting project to facilitate
understanding and experimentation without risking possible damage to your
vehicle. This is a perfect project for people of a wide range of ages and skill
levels. Even if you have never worked on a car before, or you do not feel like
your Electronics
3 min
Automation and Orchestration
Understanding Dynamic Multipoint Virtual Private Network (DMVPN)
Dynamic Multipoint Virtual Private Network (DMVPN) is a solution which enables the data to transfer from one site to another, without having the verification process of traffic.
4 min
Automation and Orchestration
Information Security Risk Management Cycle - Overview
Synopsis
Information security risk management
is a
wide topic, with many notions, processes, and technologies that are often
confused with each other.
In this series of articles, I explain notions and describe processes related to
risk management. I also review NIST and ISO standards related to information
security risk management.
In theprevious article
,
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup: June 30, 2017
Metasploit Hackathon
We were happy to host the very first Metasploit framework open source hackathon
this past week in the Rapid7 Austin. Eight Metasploit hackers from outside of
Rapid7 joined forces with the in-house team and worked on a lot of great
projects, small and large.
@bcook started the hackathon working with @sempervictus on his amazing backlog
of framework features, including REX library
improvements