3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 3/23/18
Adding some named pipes to everyone's favorite series of tubes
UserExistsError already added 64-bit named pipe payloads, and this week, we got
an extra-special upgrade: now Metasploit has 32-bit named pipe payloads! It may
feel wrong not setting a port, but connecting to existing network resources
feels so right!
It is the Final Countdown for GSoC!
The final deadline for Google Summer of Code applicants is March 27th, so get
your applications in now! We are honored to be a part of the progra
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 3/16/18
Return of the GSoC!
The Metasploit project is proud to return to Google Summer of Code this year.
Student applications are open until March 27th, so there's still time to get in!
Coding begins on May 14th, and we're eager to hear what you'd like to see added
to Metasploit. Not only do you get to work on a cool project, but you'll get
paid too [https://developers.google.com/open-source/gsoc/help/student-stipends]!
Need some inspiration? Check out our list of project ideas
[https://github.com/rapi
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 3/9/18
With the Northeast U.S. getting hit with back-to-back nor’easters this week,
it’s probably a good idea to head back inside and wait it out until spring
arrives. So toss another log on the fire, grab a hot drink, raise a toast to
all
the folks making Metasploit awesome
[https://github.com/rapid7/metasploit-framework/graphs/contributors], and catch
up on the latest!
It Goes to 11
While amplification attacks are nothing new, the memcached amplification attack
vector (reffered to as “memcrashed”
5 min
Metasploit
Guest Post: Lurking in /lib
This is a guest post from a long-time Metasploit contributor and community
member. Over the next few months, Rapid7 will be publishing a series of guest
posts featuring unique perspectives on Metasploit Framework and highlighting
some of our community’s favorite functionality, hidden gems, and backstories.
Want to contribute an idea or a post? Reach out to community[at]rapid7.com.
Back in my day, you could get dinner, dessert, and ride the trolley home all for a nickel. Oh, and we used SVN for
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 2/23/18
More Servers Please
A new module [https://github.com/rapid7/metasploit-framework/pull/9441] by Pedro
Ribeiro combines vulnerabilities for certain firmware versions of AsusWRT, which
allows an unauthenticated user to enable a special command mode on the device.
When the command mode is enabled, the device spins up infosvr on UDP port 9999.
The great thing about infosvr is that you can construct UDP packets to have it
execute commands on your behalf…. as root.
Back in Windows Land
In case your
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 2/16/18
Wintertime can be a drag. Folks get tired of shoveling snow, scraping ice from
windshields, dealing with busted water pipes, etc.. Thoughts of “fun in the sun”
activities start to seep in, as people begin wistfully daydreaming about
summertime. And for this coming summer, Metasploit has some hotness to daydream
about!
Google Summer of Code: We’re In!
The Metasploit team is SUPER EXCITED to have been recently selected by Google
[https://summerofcode.withgoogle.com/organizations/666336840069939
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 2/9/18
Teenage ROBOT Returns
Imagine the joy robot parents must feel when their infant leaves home and
returns as a teenager. ROBOT (Return of Bleichenbacher Oracle Threat)
[https://www.rapid7.com/blog/post/2017/12/13/attention-humans-the-robot-attack/]
is a 19-year-old vulnerability that allows RSA decryption and signing with the
private key of a TLS server. It allows for an adaptive-chosen ciphertext attack.
It is still very much relevant today as some modern HTTPS hosts are vulnerable
to ROBOT [htt
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Feb. 2, 2018
It’s a special day here in the U.S.. This morning, media folks were hovering
over a specific rodent [https://en.wikipedia.org/wiki/Punxsutawney_Phil] living
in an eastern state to discover that we are in for six more weeks of winter
[https://www.reuters.com/article/us-usa-groundhogday/groundhog-phil-predicts-more-cold-weather-chuck-says-spring-is-coming-idUSKBN1FM14L]
, apparently. ¯\_(ツ)_/¯ Guess we’ll stay inside and work on Metasploit…
EternalSunshine of the Security Minded
If you’re still
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Jan. 26, 2018
In last week’s wrap-up post
[https://www.rapid7.com/blog/post/2018/01/19/metasploit-wrapup-24/], we raised
awareness of the new Metasploit 5 work we’re ramping up on. This week, please
GoAhead [https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-17562] and
enjoy some new Metasploit goodies!
Get Up, GoAhead
Based on research from danielhodson [https://github.com/danielhodson], hdm
[https://github.com/hdm] and h00die [https://github.com/h00die] put together a
new module [https://www.elttam.
1 min
Metasploit Weekly Wrapup
Metasploit Wrapup 1/19/18
Metasploit 5 Development Has Begun
It's 2018, the ice is melting in Austin, and as we hinted last October
[/2017/10/13/metasploit-wrapup-metasploit-5-or-bust/], Metasploit 5 development
efforts have begun in earnest. We have a laundry list
[https://github.com/rapid7/metasploit-framework/pull/9259] of features that we
are working on for it. The first feature merged in Metasploit 5
[https://github.com/rapid7/metasploit-framework/pull/9220] replaces the module
cache, which decreases the memory used
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Jan. 12, 2018
'Sploits! Get yer 'sploits heeere!
Lots of fresh modules this week with six shiny new exploits to showcase—but
first, a blast from the past:
1992 Called
Solaris wants to help you get password hashes and they've invented the NIS
[https://en.wikipedia.org/wiki/Network_Information_Service] protocol. The next
time you find a Solaris box, locked in a closet, that three generations of
sysadmins have been afraid to touch, you can dump hashes straight to your
Metasploit loot [https://github.com/rapi
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 1/5/18
2018: a new year, new vulns, and endless opportunities to exploit them. The
Metasploit community is kicking off the year with a variety of new content,
functionality, research, and coordinated vulnerability disclosure.
New Year, New Vulns
After a couple months of coordinated disclosure work, long-time Metasploit
contributor Karn Ganeshen [https://twitter.com/juushya] offered up a handful of
modules and a couple mixins for testing wireless routers from Cambium Networks
[https://www.cambiumnetwor
7 min
Haxmas
12 Memorable Metasploit Moments of 2017
This HaXmas, we delve into 12 Memorable Metasploit Moments from 2017 that inspired us, impressed us, and made us feel more connected to our global community of contributors, users, and friends.
6 min
Haxmas
Regifting Python in Metasploit
Metasploit has been taking random Python scripts off the internet and passing them off as modules! Well, not exactly. Read on to see how we're extending the module system's scalability and what Python has to do with that.
3 min
Haxmas
HaXmas: The True Meaning(s) of Metasploit
Rapid7 Research Director Tod Beardsley kicks off our storied "12 Days of HaXmas" series with a thrilling tale of browser 0day, exploit module development, and the true meaning(s) of Metasploit.