4 min
Metasploit
Metasploit Weekly Wrap-Up: 5/13/22
Spring4Shell module
Community contributor vleminator [https://github.com/vleminator] added a new
module [https://github.com/rapid7/metasploit-framework/pull/16423] which
exploits CVE-2022-22965
[https://attackerkb.com/topics/xtgLfwQYBm/cve-2022-22965?referrer=blog]—more
commonly known as "Spring4Shell." Depending on its deployment configuration
[https://attackerkb.com/topics/xtgLfwQYBm/cve-2022-22965/rapid7-analysis?referrer=blog]
, Java Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19
3 min
Metasploit
Metasploit Weekly Wrap-Up: 2/18/22
Nagios XI web shell upload module
New this week is a Nagios Web Shell Upload module
[https://github.com/rapid7/metasploit-framework/pull/16150] from Rapid7' own
Jake Baines [https://github.com/jbaines-r7], which exploits CVE-2021-37343
[https://attackerkb.com/topics/zxpvqMqOHQ/cve-2021-37343?referrer=blog]. This
module builds upon the existing Nagios XI scanner
[https://github.com/rapid7/metasploit-framework/blob/master/documentation/modules/auxiliary/scanner/http/nagios_xi_scanner.md]
written
3 min
Metasploit
Metasploit Wrap-Up: 11/19/21
Azure Active Directory login scanner module
Community contributor k0pak4 [https://github.com/k0pak4] added a new login
scanner module for Azure Active Directory
[https://github.com/rapid7/metasploit-framework/pull/15755]. This module
exploits a vulnerable
[https://attackerkb.com/topics/rZ1JlQhXhc/cve-2020-16152?referrer=blog]
authentication endpoint in order to enumerate usernames without generating log
events. The error code returned by the endpoint can be used to discover the
validity of user
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up: 8/13/21
Three new modules that deliver RCE on Atlassian Crowd and privilege escalation to SYSTEM via print drivers. Plus, a new command shell session type for SSH clients and plenty more enhancements and fixes.
3 min
Metasploit
Metasploit Wrap-Up: 5/7/21
New modules that include Active Directory, Chrome, and Micro Focus targets. And we also reached-and-passed our 15,000th PR!!
2 min
Metasploit
Metasploit Wrap-Up: 8/21/20
Setting module options just got easier!
Rapid7's own Dean Welch [https://github.com/dwelch-r7] added a new option
[https://github.com/rapid7/metasploit-framework/pull/13961] to framework called
RHOST_HTTP_URL, which allows users to set values for multiple URL components,
such as RHOSTS, RPORT, and SSL, by specifying a single option value. For
example, instead of typing set RHOSTS example.com, set RPORT 5678, set SSL true,
you can now accomplish the same thing with the command set RHOST_HTTP_URL
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up: 3/27/20
Three new modules, including a post module to automate the installation of an embeddable Python interpreter on a target, and a new exploit for Microsoft SharePoint Workflows.
2 min
Metasploit
Metasploit Wrap-Up 10/11/19
Exploiting Windows tools
There are two new Windows modules this week, both brought to you by the
Metasploit team.
The Windows Silent Process Exit Persistence module
[https://github.com/rapid7/metasploit-framework/pull/12375], from our own
bwatters-r7 [https://github.com/bwatters-r7], exploits a Windows tool that
allows for debugging a specified process on exit. With escalated privileges, an
attacker can configure the debug process and then use the module to upload a
payload which will launch e
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 7/12/19
We hope our American friends had a wonderful Fourth of July weekend! There are
no new modules this week, so instead we're featuring two enhancements that fix
some long outstanding Framework bugs. Check out last week’s holiday wrap-up for
a list of the modules that landed while the U.S. was watching fireworks.
GatherProof (or don't)
Using ssh_login* on certain non-standard devices such as Brocade switches
[https://github.com/rapid7/metasploit-framework/issues/11905] and Juniper
firewalls [https:
2 min
Metasploit
Metasploit Wrap-Up 4/5/19
Your workflow just got easier
Are you tired of copy/pasting module names from the search results before you
can use them? Thanks to this enhancement (PR #11652)
[https://github.com/rapid7/metasploit-framework/pull/11652] by Brent Cook
[https://github.com/busterb], you can now run search with the -u flag to
automatically use a module if there is only one result. Now you're one step
closer to popping a shell!
A pair of new JSO modules
Metasploit published research a few weeks ago on Java Serializ
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 1/4/19
Happy New Year to the Metasploit community! As we kick off 2019, we're excited
to see all the modules, enhancements, and discussions the new year will bring.
Ring In 2019 With SSL
There is a new datastore option
[https://github.com/rapid7/metasploit-framework/pull/11160] courtesy of wvu
[https://github.com/wvu-r7] called CMDSTAGER::SSL. This exposes the ability to
enable SSL/TLS command stagers with set cmdstager::ssl true.
Auld Erlang Syne
Good news if you're a fan of the multi/misc/erlang_co
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 9/28/18
Trevor Forget: Metasploit Town Hall @ Derbycon
Metasploit’s Brent Cook [/author/brent-cook], Adam Cammack
[/author/adam-cammack], Aaron Soto [/author/aaron], and Cody Pierce are offering
themselves up to the crowds at this year’s fourth annual Metasploit Town Hall at
Derbycon [https://www.derbycon.com/]. Heading to bourbon country next weekend?
Block off your 5 PM hour on Saturday, October 6 to join the team as they unveil
some new hotness in Metasploit Framework and take questions and requests