3 min
Exploits
Exploiting a 64-bit browser with Flash CVE-2015-5119
Some weeks ago, on More Flash Exploits in the Framework
, we introduced the
flash_exploiter library, which is used by Metasploit to quickly add new Flash
exploit modules. If you read that blog entry, then you already know that
flash_exploiter only supports 32-bit browsers (renderers). In this blog post, we
will demonstrate initial steps in adding IE11 64-bit support to CVE-2015-5119
, which is o
6 min
Events
Rapid7 Takes Las Vegas: Black Hat, BSidesLV & DEF CON ... Talks, Parties & Giveaways... phew!
First things first:
You must be registered & confirmed to be able to attend our 2015 Black Hat
party.
I can't emphasize this enough: Unlike previous years, we are not doing any kind
of at-the-door registration for our party this year.
If your plan was to live in the spirit of utter spontaneity, roll up to the club
and see if you can happen to get in without registering beforehand -- you're
going to be disappointed, and we really don't want to see that happen! While w
4 min
Events
The Black Hat Attendee Guide Part 5a - The Magic of People
Joining us for the first time? This post is part of a series that starts right
here .
So this post is a bit of a bonus. I've asked my dear friend Quinton Jones
to share some wisdom and inspiration
on how he injects passion and energy into his introductions. He's simply
unforgettable, one of the greatest customer champions and business development
folks I know, thanks to his passion for people. Please enj
3 min
Metasploit Weekly Wrapup
Weekly Metasploit Wrapup: T-Shirts, T-Shirts, & Some Modules
Black Hat T-Shirts!
Well, it's a week or so until DEF CON 23, and since you're all busy prepping all
your demos and presentations and panels and things, I figured I should remind
you that among all your gear, you should probably toss some clothes in your bag
before you head out the door. In case this slips your mind, though, don't sweat,
we have you covered.
Pictured at right is the winning design from the annual Metasploit T-Shirt
contest, submitted by LewisFX
5 min
Events
The Black Hat Attendee Guide Part 7a: Electronic Survival
If you're just joining us, this post is part of a Black Hat Attendee Guide
series that starts right here
.**
When traveling to industry conferences, most people prepare their electronic
companions (laptops, cell phones, etc) by asking: “Did I pack the right charger
in my carry on?”
The premier gathering of the world's best and brightest hackers might be a great
opportunity for you to up your travel security game. This post serves as a quick
gui
5 min
Events
The Black Hat Attendee Guide Part 7: Your Survival Kit
Joining us for the first time? This post is part seven of a series that starts
right here .
Hacker Summer Camp is no joke, and you've got to have a game plan when you head
for Vegas. If you don't travel frequently, this is for you.
Ignoring sartorial conundrums and basic hygiene, this post is focused on keeping
your body operating at peak… or at least somewhat operational.
Vegas: It's nothing like home for most of us. Desert allergens, low humi
10 min
Events
The Black Hat Attendee Guide Part 6: The Sponsor Hall, Arsenal, and more
_
If you are just joining us, this is the sixth post in the series starting here
._
Conferences are magical and serendipitous. YouTube can't capture the electricity
you remember in the room as you tell someone “I watched Barnaby jackpot an ATM,”
as others echo back “I was there that year too!”
At technical conferences, the content leads the way—it is what brings us to the
show. Catching up on that research and work being done at “the tip of the
3 min
IT Ops
How to Add a GPS Time Source to ntpd
USB GPS dongles have come down significantly in price in recent years and I
picked one up to play with recently.
Apart from using a GPS module to report your latitude, longitude, altitude and
time for mapping applications, it’s also possible to feed the time information
to ntpd as a back-up time source or as a highly accurate time source depending
on the GPS module you end up getting.
The module that I use in this blog post
6 min
Metasploit
Interning at Rapid7: A "git push" in the Right Direction
How I Got Here
Hey there! My name is Mo. I'm currently an intern here at Rapid7 working in the
Austin office as part of the Metasploit team. If you came here expecting a deep
understanding of Metasploit, this blog post isn't the right place. If you ARE
interested in knowing what it's like to being a small town college student
working at a leading firm in security engineering, then keep reading!
Everyone used to tell me that every mistake and failure was a push in the right
direction, but that
1 min
Legal
Rapid7's Comments on the Wassenaar Arrangement Proposed Rule
For the past two months, the Department of Commerce's Bureau of Industry and
Security (BIS) has been running a public consultation to solicit feedback on its
proposal for implementing export controls for intrusion software under the
Wassenaar Arrangement. You can read about the proposal and Rapid7's initial
thoughts here
. The consultation window closed on Monday, July 20th
3 min
Metasploit Weekly Wrapup
Weekly Metasploit WrapUp: A Wild Committer Appears!
Browser Autopwn Version 2
Hey all! If you haven't been following the Metasploit development over the last
few weeks, you know that we've been pretty busy getting Browser Autopwn Version
2 (BAPv2) out the door and into Metasploit Framework. This project was, and is,
driven by our own beloved Wei _sinn3r Chen, and
it's one of those projects around here that I'm really personally very excited
about.
If you want to jump into all the implementation details and history,
5 min
Events
The Black Hat Attendee Guide Part 5 - Meaningful Introductions
If you are just joining us, this is the fifth post in the series starting here
.
Making An Introduction
I might be wrong, but I'll argue that networking is a transitive verb, so
ENGAGE! The real magic starts happening as you progress:
* Level 1-- Start with a “Hi, my name is… ” Yes, it's that simple, thanks to
Slim Shady
* Level 2-- Demonstrate that you have an idea of the world the other person
live
2 min
IT Ops
Playing with Java 8's Completable Futures
Of the many additions to Java 8 such as the Stream API
and
lambdas
, I
noticed one of the lesser talked about ones was CompletableFutures
. So I decided to have a play around with them on the last Java component I
wrote. My use case in a nutshell was piping larg
1 min
Patch Tuesday
Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)
Java 8 servers versions prior to u46 are susceptible to a remote unauthenticated
denial of service (hard crash) when used with AES intrinsics (AES-NI) CPU
extensions on supported processors. AES intrinsics are enabled by default on the
Oracle JVM if the the JVM detects that processor capability, which is common for
modern processors manufactured after 2010. For more on AES-NI, see the
Wikipedia
article .
This issue was tracked in the OpenJDK p
6 min
The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 2
Hello again,
Welcome back! So yesterday we did an introduction about the brand new Browser
Autopwn 2, if you have not read that, make sure to check it out
. And today, let's talk about how to use it, what you can do with it for better
vulnerability validation and penetration testing.
As we explained in the previous blog post, Browser Autopwn 2 is a complete
redesign from the firs