4 min
Nexpose
GHOSTbuster: How to scan just for CVE-2015-0235 and keep your historical site data
A recently discovered severe vulnerability, nicknamed GHOST, can result in
remote code execution exploits on vulnerable systems. Affected systems should be
patched and rebooted immediately. Learn more about
CVE-2015-0235 and its risks
.
The Nexpose 5.12.0 content update provides coverage for the GHOST vulnerability.
Once the Nexpose 5.12.0 content update
3 min
IT Ops
The Role of Logging in ChatOps
What is ChatOps you might ask?
Well, if you are like me, you and your team may be already be doing it and you
don’t even know it. On a recent visit to San Francisco I was telling one of our
tech partners about our new Slack integration
when he responded by saying, “Slack and Logentries, cool! Yep everyone is doing
ChatOps these days…”
2 min
Linux
GHOST in the Machine - Is CVE-2015-0235 another Heartbleed?
CVE-2015-0235 is a remote code execution vulnerability affecting Linux systems
using older versions of the GNU C Library (glibc versions less than 2.18). The
bug was discovered by researchers at Qualys and named GHOST in reference to the
_gethostbyname function (and possibly because it makes for some nice puns).
To be clear, this is NOT the end of the Internet as we know, nor is it further
evidence (after Stormaggedon) that the end of the world is nigh. It's also not
another Heartbleed. But it
3 min
IT Ops
Infographic: Top 4 Log Management Challenges
At Logentries we chat to new users everyday who are
looking for an improved solution for centralizing and analyzing their log data.
They have often tried rolling their own solution, have previously gone the open
source route, or are using an “old school” logging technology.
But, what we find across new users, regardless of how they are managing their
log data, are some common challenges that have historically made log management
4 min
The Internet of Gas Station Tank Gauges
Introduction
Automated tank gauges (ATGs) are used to monitor fuel tank inventory levels,
track deliveries, raise alarms that indicate problems with the tank or gauge
(such as a fuel spill), and to perform leak tests in accordance with
environmental regulatory compliance. ATGs are used by nearly every fueling
station in the United States and tens of thousands of systems internationally.
Many ATGs can be programmed and monitored through a built-in serial port, a
plug-in serial port, a fax/modem,
4 min
IT Ops
Unit testing with Karma and Jasmine for AngularJS
So you’ve started to build applications with AngularJS; or, maybe you’ve
done unit testing before but haven’t used it with AngularJS; or, maybe it’s all
new to you, but either way this article should help to orient you to the value
of using Karma with Jasmine and offer some tips on displaying functionalities of
Angular JS. Let’s get started!
My app is small it doesn’t need any tests, right?
Wrong!
A small app can have errors and it’s bad practic
2 min
Microsoft
Patch Tuesday, January 2015 - Dawn of a new era
Microsoft's January 2015 patch Tuesday marks the start of a new era. It seems
that Microsoft's trend towards openness in security has reversed and the company
that was formerly doing so much right, is taking a less open stance with patch
information. It is extremely hard to see how this benefits anyone, other than,
maybe who is responsible for support revenue targets for Microsoft.
What this means is that the world at large is getting their first look at
understandable information about this
4 min
IT Ops
Dynamite Plots, Logs, & the Joy In Knowing
I saw this online and chuckled.
I believe it was Mark Twain that said, “Humor is the good natured side of
truth.” Well, in my humble opinion, humor can be used as the genesis for
interesting blog posts. So, you may be wondering, what do Dynamite Plots, logs
and the joy of knowledge have to do with each other?
Well, if you have a few minutes, I’ll try to make the link.
For me, the humor of the cartoon above is rooted in multiple areas, but most of
all in the idea that the data inherently has
6 min
Google No Longer Provides Patches for WebView Jelly Bean and Prior
Over the past year, independent researcher Rafay Baloch
(of "Rafay's Hacking Articles") and Rapid7's
Joe Vennix have been knocking out Android
WebView exploits somewhat routinely, based both on published research and
original findings. Today, Metasploit ships with 11 such exploits, thanks to
Rafay, Joe, and the rest of the open source security community. Generally
speaking, these exploits affect "only" Android 4.3 and prior -- ei
4 min
Metasploit
HOTFIX: Metasploit Startup Issues After Upgrading to 4.11.0 (Update 2014122301)
Overview
The Update (2014122301) which was released on December, 23th 2014, failed to
include necessary files for the application to update to version 4.11.0 for the
first time.
Issue
The application will not start, therefore browser will provide generic "The page
can't be displayed" message when trying to load the web UI.
Additionally, various log messages may appear in respective log files.
Windows: C:\metasploit\apps\pro\engine\prosvc.log
Linux: /opt/metasploit/apps/pro/engine/prosvc_stder
7 min
Metasploit
12 Days of HaXmas: Maxing Meterpreter's Mettle
This post is the twelfth in a series, 12 Days of HaXmas, where we usually take a
look at some of more notable advancements and events in the Metasploit Framework
over the course of 2014. As this is the last in the series, let's peek forward,
to the unknowable future.
Happy new year, it's time to make some resolutions. There is nothing like a
fresh new year get ones optimism at its highest.
Meterpreter is a pretty nifty piece of engineering, and full of useful
functionality. The various extensi
3 min
Metasploit
12 Days of HaXmas: Metasploit, Nexpose, Sonar, and Recog
This post is the tenth in a series, 12 Days of HaXmas, where we take a look at
some of more notable advancements and events in the Metasploit Framework over
the course of 2014.
The Metasploit Framework uses operating
system and service fingerprints for automatic target selection and asset
identification. This blog post describes a major overhaul of the fingerprinting
backend within Metasploit and how you can extend it by submitting new
fingerprints.
Histo
8 min
Windows
12 Days of HaXmas: Does it Blend Like a Duck?
This post is the fifth in a series, 12 Days of HaXmas, where we take a look at
some of more notable advancements and events in the Metasploit Framework over
the course of 2014._
Writing portable software is not hard. It's just like walking through a
minefield! Getting to the other side, that's the tricky part.
Sure, if you target C, Unix-like systems and GCC or LLVM, you may not run into
too many hassles these days. There are still a few annoying differences between
BSDs and Linux, but POSIX a
9 min
Metasploit
12 Days of HaXmas: Buffer Overflows Come and Go, Bad Passwords are Forever
This post is the fourth in a series, 12 Days of HaXmas, where we take a look at
some of more notable advancements and events in the Metasploit Framework over
the course of 2014.
This summer, the Metasploit team began the large undertaking of reworking
credentials throughout the project. Metasploit, as you already know, began as a
collection of traditional exploits. Over the years it has grown into much more
than that. Credentials were first introduced into Metasploit in the form of
Auxiliary Sc
4 min
Haxmas
12 Days of HaXmas: Improvements to jsobfu
This post is the third in a series, 12 Days of HaXmas, where we take a look at
some of more notable advancements and events in the Metasploit Framework over
the course of 2014.
Several months ago, Wei sinn3r Chen and I landed
some improvements to Metasploit's Javascript obfuscator, jsobfu. Most notably,
we moved it out to its own repo and gem
, wrapped it in tests, beefed up its AV
resilience, and