3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/8/19
Ubiquitous Devices
Our Rapid7 Labs team pulled the thread
[https://www.rapid7.com/blog/post/2019/02/01/ubiquiti-discovery-service-exposures/]
on some recent buzz around exploitable Ubiquiti devices, which led to a new
scanner module [https://github.com/rapid7/metasploit-framework/pull/11338] (
auxiliary/scanner/ubiquiti/ubiquiti_discover.rb) from jhart-r7
[https://github.com/jhart-r7]. This module uses a simple UDP protocol to
identify potentially exploitable Ubiquiti devices on your network, a
2 min
Metasploit
Metasploit Wrapup 1/25/19
Hi everyone! For those in the US, hope you all had a great MLK weekend. We have a pretty light release due to the holiday, but we still have some cool stuff in the house. Check it out!
1 min
Metasploit
Metasploit Wrapup 1/18/19
This week, phra offers up a new potato dish to make privilege escalation in Windows just a bit tastier.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 1/12/19
MSF 5 in the wild
We announced the release
[https://www.rapid7.com/blog/post/2019/01/10/metasploit-framework-5-0-released/]
of Metasploit Framework 5.0 this week. It’s Metasploit’s first major version
release since 2011, and it includes lots of good stuff the team has been working
on for the past year-plus. It will be packaged and integrated into your favorite
software distributions over the next few months; until then, you can get MSF 5
by checking out the 5.0.0 tag
[https://github.com/rapid7/
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 1/4/19
Happy New Year to the Metasploit community! As we kick off 2019, we're excited
to see all the modules, enhancements, and discussions the new year will bring.
Ring In 2019 With SSL
There is a new datastore option
[https://github.com/rapid7/metasploit-framework/pull/11160] courtesy of wvu
[https://github.com/wvu-r7] called CMDSTAGER::SSL. This exposes the ability to
enable SSL/TLS command stagers with set cmdstager::ssl true.
Auld Erlang Syne
Good news if you're a fan of the multi/misc/erlang_co
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 12/21/18
Safari Proxy Object Type Confusion
Metasploit committer timwr [https://github.com/timwr] recently added a macOS
Safari RCE exploit module
[https://github.com/rapid7/metasploit-framework/pull/10944] based on a solution
[https://github.com/saelo/pwn2own2018] that saelo [https://github.com/saelo]
developed and used successfully at Pwn2Own 2018
[https://www.thezdi.com/blog/2018/3/14/welcome-to-pwn2own-2018-the-schedule].
saelo's exploit is a three-bug chain: a Safari RCE (CVE-2018-4233), a sandbox
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 12/14/18
Backups that Cause Problems
hypn0s [https://github.com/hypn0s] contributed a module
[https://github.com/rapid7/metasploit-framework/pull/10960] that exploits Snap
Creek’s Duplicator plugin for WordPress. Duplicator is a plugin that eases the
backup and migration of WordPress installations. For versions 1.2.40 and below,
Duplicator leaves behind a number of sensitive files, including one that gives
access to controlling the WordPress restoration process. Sending a POST request
to the now accessib
2 min
Metasploit
Metasploit Wrapup 12/7/18
If you are tired of all the snake memes and images we pushed out as we stood up support for python external modules over the last year or so, I have terrific news for you!
4 min
Metasploit Weekly Wrapup
Metasploit Wrapup 11/30/18
Why can't I hold all these Pull Requests?
It has been a busy month here in Metasploit-land, with the holidays, the holiday
community contributions, and our community CTF
[/2018/11/05/announcing-the-2018-metasploit-community-ctf/]. It doesn't help
that the last few months have seen our open pull request count keep climbing as
well, reaching over 90 at times. Our fearless leader, busterb
[https://github.com/busterb], decided to take on the challenge and landed over
20 PRs by himself in the last tw
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 11/16/18
The Malicious Git HTTP Server For CVE-2018-17456 module by timwr exploits a vulnerability in Git that can cause arbitrary code execution when a user clones a malicious repository using commands such as git clone --recurse-submodules and git submodule update.
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 11/9/18
Now in Framework: Exploit for jQuery File Upload plugin vuln, two new post modules to exfil images and texts from compromised iOS devices. Plus, this year's community CTF.
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 11/2/18
Today marks the 30th anniversary of the Morris worm. We were hit by a wave of nostalgia, so here's a little history and a module-trip down memory lane courtesy of wvu.
4 min
Metasploit
Metasploit Wrapup: 10/26/18
We got to hit the build button three times this week. It's not something that we
normally do, since the Metasploit release each week triggers automatically. But
it's been such a week of surprise vulnerabilities and improvements that it made
sense to get a few extra builds out the door. So, Metasploit this week jumps
from 4.14.18 to 4.17.21. Look for it during your next Metasploit romp.
Exploit wrapup
While the excitement around libssl CVE-2018-10933
[https://github.com/rapid7/metasploit-framewo
1 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 10/19/18
A brand new Solaris module, improved Struts module, and the latest improvements.
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 10/12/18
New evasion modules in Metasploit Framework, highlights from our Town Hall at DerbyCon VIII, and the last week's improvements and module additions.