All Posts

3 min Exploits

Exploiting a 64-bit browser with Flash CVE-2015-5119

Some weeks ago, on More Flash Exploits in the Framework , we introduced the flash_exploiter library, which is used by Metasploit to quickly add new Flash exploit modules. If you read that blog entry, then you already know that flash_exploiter only supports 32-bit browsers (renderers). In this blog post, we will demonstrate initial steps in adding IE11 64-bit support to CVE-2015-5119 , which is o

6 min Events

Rapid7 Takes Las Vegas: Black Hat, BSidesLV & DEF CON ... Talks, Parties & Giveaways... phew!

First things first: You must be registered & confirmed to be able to attend our 2015 Black Hat party. I can't emphasize this enough: Unlike previous years, we are not doing any kind of at-the-door registration for our party this year. If your plan was to live in the spirit of utter spontaneity, roll up to the club and see if you can happen to get in without registering beforehand -- you're going to be disappointed, and we really don't want to see that happen! While w

4 min Events

The Black Hat Attendee Guide Part 5a - The Magic of People

Joining us for the first time? This post is part of a series that starts right here . So this post is a bit of a bonus. I've asked my dear friend Quinton Jones to share some wisdom and inspiration on how he injects passion and energy into his introductions. He's simply unforgettable, one of the greatest customer champions and business development folks I know, thanks to his passion for people. Please enj

3 min Metasploit Weekly Wrapup

Weekly Metasploit Wrapup: T-Shirts, T-Shirts, & Some Modules

Black Hat T-Shirts! Well, it's a week or so until DEF CON 23, and since you're all busy prepping all your demos and presentations and panels and things, I figured I should remind you that among all your gear, you should probably toss some clothes in your bag before you head out the door. In case this slips your mind, though, don't sweat, we have you covered. Pictured at right is the winning design from the annual Metasploit T-Shirt contest, submitted by LewisFX

5 min Events

The Black Hat Attendee Guide Part 7a: Electronic Survival

If you're just joining us, this post is part of a Black Hat Attendee Guide series that starts right here .** When traveling to industry conferences, most people prepare their electronic companions (laptops, cell phones, etc) by asking: “Did I pack the right charger in my carry on?” The premier gathering of the world's best and brightest hackers might be a great opportunity for you to up your travel security game. This post serves as a quick gui

5 min Events

The Black Hat Attendee Guide Part 7: Your Survival Kit

Joining us for the first time? This post is part seven of a series that starts right here . Hacker Summer Camp is no joke, and you've got to have a game plan when you head for Vegas. If you don't travel frequently, this is for you. Ignoring sartorial conundrums and basic hygiene, this post is focused on keeping your body operating at peak… or at least somewhat operational. Vegas: It's nothing like home for most of us. Desert allergens, low humi

10 min Events

The Black Hat Attendee Guide Part 6: The Sponsor Hall, Arsenal, and more

_ If you are just joining us, this is the sixth post in the series starting here ._ Conferences are magical and serendipitous. YouTube can't capture the electricity you remember in the room as you tell someone “I watched Barnaby jackpot an ATM,” as others echo back “I was there that year too!” At technical conferences, the content leads the way—it is what brings us to the show. Catching up on that research and work being done at “the tip of the

3 min IT Ops

How to Add a GPS Time Source to ntpd

USB GPS dongles have come down significantly in price in recent years and I picked one up to play with recently. Apart from using a GPS module to report your latitude, longitude, altitude and time for mapping applications, it’s also possible to feed the time information to ntpd as a back-up time source or as a highly accurate time source depending on the GPS module you end up getting. The module that I use in this blog post

6 min Metasploit

Interning at Rapid7: A "git push" in the Right Direction

How I Got Here Hey there! My name is Mo. I'm currently an intern here at Rapid7 working in the Austin office as part of the Metasploit team. If you came here expecting a deep understanding of Metasploit, this blog post isn't the right place. If you ARE interested in knowing what it's like to being a small town college student working at a leading firm in security engineering, then keep reading! Everyone used to tell me that every mistake and failure was a push in the right direction, but that

1 min Legal

Rapid7's Comments on the Wassenaar Arrangement Proposed Rule

For the past two months, the Department of Commerce's Bureau of Industry and Security (BIS) has been running a public consultation to solicit feedback on its proposal for implementing export controls for intrusion software under the Wassenaar Arrangement. You can read about the proposal and Rapid7's initial thoughts here . The consultation window closed on Monday, July 20th

3 min Metasploit Weekly Wrapup

Weekly Metasploit WrapUp: A Wild Committer Appears!

Browser Autopwn Version 2 Hey all! If you haven't been following the Metasploit development over the last few weeks, you know that we've been pretty busy getting Browser Autopwn Version 2 (BAPv2) out the door and into Metasploit Framework. This project was, and is, driven by our own beloved Wei _sinn3r Chen, and it's one of those projects around here that I'm really personally very excited about. If you want to jump into all the implementation details and history,

5 min Events

The Black Hat Attendee Guide Part 5 - Meaningful Introductions

If you are just joining us, this is the fifth post in the series starting here . Making An Introduction I might be wrong, but I'll argue that networking is a transitive verb, so ENGAGE! The real magic starts happening as you progress: * Level 1-- Start with a “Hi, my name is… ” Yes, it's that simple, thanks to Slim Shady * Level 2-- Demonstrate that you have an idea of the world the other person live

2 min IT Ops

Playing with Java 8's Completable Futures

Of the many additions to Java 8 such as the Stream API and lambdas , I noticed one of the lesser talked about ones was CompletableFutures . So I decided to have a play around with them on the last Java component I wrote. My use case in a nutshell was piping larg

1 min Patch Tuesday

Oracle Java JRE AES Intrinsics Remote Denial of Service (CVE-2015-2659)

Java 8 servers versions prior to u46 are susceptible to a remote unauthenticated denial of service (hard crash) when used with AES intrinsics (AES-NI) CPU extensions on supported processors. AES intrinsics are enabled by default on the Oracle JVM if the the JVM detects that processor capability, which is common for modern processors manufactured after 2010. For more on AES-NI, see the Wikipedia article . This issue was tracked in the OpenJDK p

6 min

The New Metasploit Browser Autopwn: Strikes Faster and Smarter - Part 2

Hello again, Welcome back! So yesterday we did an introduction about the brand new Browser Autopwn 2, if you have not read that, make sure to check it out . And today, let's talk about how to use it, what you can do with it for better vulnerability validation and penetration testing. As we explained in the previous blog post, Browser Autopwn 2 is a complete redesign from the firs