3 min
Metasploit
Weekly Metasploit Update: DNS Payloads, Exploit-DB, and More
This week we've got a nifty new shellcode delivery scheme, we've normalized on
Exploit-DB serial numbers, and a pile of new modules, so if you don't have
Metasploit yet, you can snag it here [http://www.metasploit.com/download/].
DNS Payloads in TXT Records
To quote RFC 1464 [http://tools.ietf.org/html/rfc1464] describing DNS TXT
records, "it would be useful to take advantage of the widespread use and
scalability of the DNS to store information that has not been previously
defined." I don't kno
1 min
Metasploit
Identifying IPv6 Security Risks in IPv4 Networks: Tools
This post details some of the tools used in my recent IPv6 security testing
webcast [http://information.rapid7.com/WebcastOnDemand_IPv6.html] If you have
any specific questions, please open a Discussion
[https://community.rapid7.com/community/metasploit/content?filterID=content~objecttype~objecttype%5Bthread%5D]
thread.
A minimal IPv6 toolbox:
* A Linux-based operating system [http://www.ubuntu.com/] with IPv6 support
(BSD variants are great too)
* The IPv6 Attack Toolkit [http://www.thc
3 min
Metasploit
Weekly Metasploit Update: Spiceworks, AFP, RDP, and a New HTTP Downloader
After a couple of relatively light weeks (blame SXSW, I guess), this week's
update has quite a few neat new additions. As always, if you don't already have
Metasploit, what are you waiting for
[https://www.rapid7.com/products/metasploit/download/]? For the rest of us,
here's what's new.
Importapalooza
This week's update has support for importing asset lists exported from
Spiceworks, courtesy of Rapid7's Brandon Perry. Spiceworks is a free asset
management application used by tons of IT pros and
3 min
Metasploit
Weekly Metasploit Update: Session Smarts and GitHub
It's another Metasploit update, and it's headed straight for us!
Session Smarts
This week, Metasploit session management got a whole lot smarter. Here's the
scenario: As a penetration tester, you rook a bunch of people into clicking on
your browser-embedded Flash exploit [/2012/03/08/cve-2012-0754], sit back, and
watch the sessions rolling in. However, they're all behind a single NAT point,
so all your sessions appear to be terminating at a single IP address, and you
quickly lose track of who's
3 min
Metasploit
New Metasploit Swag Store Is Online
You may remember the awesome Metasploit T-shirt contest we ran in April of last
year [/2011/04/13/who-will-you-be-wearing-vote-for-the-new-metasploit-t-shirt].
We received a ton of submissions at the time and selected a winning T-shirt,
designed by Danny Chrastil.
It was a long and arduous journey for us to get the T-shirts printed and to get
the back-end systems up and running for the Metasploit Swag Store
[http://www.metasploit.com/wear-swag/]...but it's finally here. Yes, you'll
notice tha
2 min
Metasploit
Weekly Metasploit Update: Wmap, Console Search, and More!
In addition to the nuclear-powered exploit, we've got a new slew of updates,
fixes and modules this week for Metasploit, so let's jump right into the
highlights for this update.
Updated WMAP Plugin
Longtime community contributor Efrain Torres provided a much-anticipated update
to the Wmap plugin. Wmap automates up a bunch of web-based Metasploit modules
via the Metasploit console, from HTTP version scanning to file path bruteforcing
to blind SQL injection testing. If you're not already familiar
2 min
Metasploit
Weekly Metasploit Update: POSIX Meterpreter and New Exploits
This is a pretty modest update, since it's the first after our successful 4.2
release [https://www.rapid7.com/products/metasploit/download/] last week. Now
that 4.2 is out the door, we've been picking up on core framework development,
and of course, have a few new modules shipping out.
Meterpreter Updates
James "egyp7" Lee and community contributor mm__ have been banging on the POSIX
side of Meterpreter development this week, and have a couple of significant
enhancements to Linux Meterpreter. T
1 min
Metasploit
Free Microsoft Virtual Machines for Testing
I am often asked how security professionals and students can safely test
security software. My usual response is, they should create a virtual lab with
diverse operating systems for testing. The problem that many encounter is they
don't have licenses available to install the operating systems.
During my creating and testing the Metasploit Javascript Keylogger, I came
across free virtual machines from Microsoft that are sure to be useful to
security professionals, web designers, and web programm
2 min
Metasploit
Metasploit 4.2 Released: IPv6, VMware, and Tons of Modules!
Since our last release in October, we've added 54 new exploits, 66 new auxiliary
modules, 43 new post-exploitation modules, and 18 new payloads -- that clocks in
at just about 1.5 new modules per day since version 4.1. Clearly, this kind of
volume is way too much to detail in a single update blog post.
IPv6 Coverage
Metasploit 4.2 now ships with thirteen brand new payloads, all added to support
opening command sessions and shells on IPv6 networks. In addition, Metasploit's
existing arsenal of p
3 min
Metasploit
The Art of Keylogging with Metasploit & Javascript
Rarely does a week go by without a friend or family member getting their login
credentials compromised, then reused for malicious purposes. My wife is always
on the lookout on Facebook, warning relatives and friends to change their
passwords. Many people don't understand how their credentials get compromised.
Password reuse on several websites is usually the culprit. Password reuse is a
problem even if the website encrypts the passwords in their databases. An
attacker only needs to insert some
2 min
Metasploit
Weekly Metasploit Update: All Your Auth Are Belong To Us
This week, with RSA 2012 fast approaching and the final touches on Metasploit
version 4.2 getting nailed down, we've been in a code freeze for core Metasploit
functionality. However, that doesn't apply to the parade of modules, so here's
what's in store for the next -- and quite likely last -- update for Metasploit
4.1.
Authentication Credential Gathering and Testing
Jon Hart has been on fire with new Metasploit contributions -- this week, he's
come up with a trio of credential snarfing post mo
2 min
Metasploit
Getting The Most Out of Metasploit: Pentesting, Password Auditing, and Vulnerability Validation
When we talk to Metasploit users, they usually use it for either penetration
testing, password auditing or vulnerability validation, but few use it for more
than one of these purposes. By leveraging your investment in Metasploit, you can
triple-dip at the same price - no extra licenses needed.
Penetration Testing
With penetration testing, you can identify issues in your security
infrastructure that could lead to a data breach. Weaknesses you can identify
include exploitable vulnerabilities, we
2 min
Metasploit
Weekly Metasploit Update: New Payloads, New Modules, and PCAnywhere, Anywhere
PCAnywhere, Anywhere
The big news this week centered around Symantec's pcAnywhere. For starters,
there's a new ZDI advisory
[http://www.zerodayinitiative.com/advisories/ZDI-12-018/] for a buffer overflow
in the username field. More notably, though, was the advice in a Symantec white
paper which advises customers to "disable or remove Access Server and use remote
sessions via secure VPN tunnels." So, while the Metasploit elves bang away at a
proper buffer overflow module, HD Moore busted out a pa
2 min
Nexpose
How to Exploit A Single Vulnerability with Metasploit Pro
Metasploit Pro's smart exploitation function is great if you want to get a
session quickly and don't care about being "noisy" on the network, but there are
certain situations where you may want to use just one exploit:
* You're conducting a penetration test and want to exploit just one
vulnerability so you don't draw too much attention (i.e. you want to use a
sniper rifle, not a machine gun)
* You're a vulnerability manager and want to validate just one vulnerability to
know whether
2 min
Metasploit
Remote-Controlling Metasploit Through APIs
Metasploit offers some great ways to automate its functionality through a
programming interface. Metasploit users have built custom tools and processes
based on this functionality, saving them time to conduct repetitive tasks, or
enabling them to schedule automated tasks. Our most advanced customers have even
intgrated Metasploit Pro into their enterprise security infrastructure to
automatically verify the exploitability of vulnerabilities to make their
vulnerability management program more ef