1 min
Getting the Most From Customizable CSV Exports - Part 8
Good Day! I am Eric Pattenden, a Sales Engineer with Rapid7.
Today I bring you two additional use cases
for
the recently improved CSV data export capability featured in Nexpose
.
The Nexpose CSV Export
can
now be customized to show only desired data for discovered vulnerabilities and
t
3 min
Metasploit
Weekly Metasploit Update: Back to Work!
Hey, it's the first post-Metasploit 4.3.0 update, which means that I'm back in
the blogging business. Huzzah!
We've all been heads-down for a while getting this bad boy
out the door, so while there's not a ton
of new functionality to talk about this week, we do have some neat new modules,
and one API change for module developers.
Wake On LAN
"The most secure computer is the one that's not turned on," is an old computer
security adage, speaking to the compl
3 min
Getting the Most From Customizable CSV Exports - Part 5
Coming to you, live from Rapid7, my name is Chris Godoy and I work on the
Security Solutions team here in Boston. My colleagues and I have been posting
creative ways to take advantage of Nexpose's new and improved CSV export options
. It allows you to easily extract vital pieces of metadata from your
vulnerability scans that may not be clearly depicted in our out of the box (or
customizable) reports.
Now you can decide exactly what data fields you would like to have at your
fingertips to manipu
3 min
Getting the Most from Customizable CSV Exports - Part 4
Hi SecurityStreet, let me introduce myself. I've been an Enterprise Security
Engineer at Rapid7 for almost two years now, and have seen fads come and go.
Think 0-day Flash updates (ok – maybe not; to Adobe's credit – they've
significantly decreased their bugs as time goes on), but one theme has been
consistent – how the @#$% do I go about analyzing risk?
Analyzing risk is one of the most difficult aspects of any good risk assessment
program: risk can be broken down by device, asset classificat
1 min
Getting the Most from Customizable CSV Exports - Part 3
Hello Community! As part of the Security Solutions team here at Rapid7, I get to
work day in and day out with Nexpose users, helping them address the challenges
they face.
Nexpose can generate a tremendous amount of great, actionable risk data. On
Monday my colleague, Sean Blanton, posted a blog on the new CSV export
capabilities
in Nexpose. Throughout this week and next, the Security Solutions team is
posting examples of how
2 min
Nexpose
Getting the Most from Customizable CSV Exports - Part 2
Hi there SecurityStreet! As a Technical Proposal Writer for Rapid7, I get to do
technical deep dives of Nexpose with our Engineering and Security Solutions
teams. Lately I've had a lot of chances to describe the enhanced CSV exports
we've added in Nexpose 5.2, but up until now I haven't gotten the chance to
really show off their capabilities.
As Sean Blanton said in our first demonstration
of the new
CSV export capabilities, us
1 min
Networking
A Penetration Test is Quality Assurance for Your Security Controls
“We've spent all this money on IT security and you're still telling me that you
don't know whether our systems are secure?” your CEO might say. In addition,
they may challenge that you should know your systems well enough to know their
weaknesses? Not really.
Let's say you're a manufacturer of widgets. Even if you have the best machine
and the brightest people working for you, you'll still want to ensure that the
widgets that leave the factory will work as expected to ensure high customer
sat
1 min
Networking
Leveraging Security Risk Intelligence to Improve Your Security Posture
As most of you probably know, attackers routinely target exploitable weaknesses
of security systems rather than pre-identifying victims for their attacks. Also,
most breaches that occur in database security systems are avoidable without
expensive or sophisticated countermeasures.
In its 2012 Data Breach Investigations Report, Verizon
registered 174 million compromised records for 2011, compar
3 min
Nexpose
How to Secure Your Videoconferencing Systems: H.323 Scanning with Rapid7 Nexpose
For my inaugural post on the SecurityStreet blog, I thought it would be
beneficial to highlight the H.323 coverage I recently added to Nexpose. With all
the attention HD Moore's work
in this area
garnered, it seemed that there was a definite need for this functionality, so as
of Nexpose 5.2, users can scan their networks for devices running H.323 services
as well as detect whether those services have the auto-answer functionality
enable
4 min
Metasploit
Weekly Metasploit Update: SCADA, Lab Gem, and Squid Pivoting
This week's update is packed full of
awesome, and I don't use that term lightly.
SCADA Attacks, DigtialBond, and Metasploit
This week sees the addition of six new SCADA modules, targeting a variety of PLC
devices, including two new modules aimed at the Schneider Quantum programmable
logic controller (PLC). In order to give penetration testers the ability to
accurately assess SCADA infrastructure, Tod Beardsley (from Rapid7) and K. Reid
Wightman (from Digit
2 min
Nexpose
Automating Nexpose Discovery Connections through the Java API
Nexpose has long offered APIs allowing for automated workflow operations. The
following examples are intended to help Nexpose users automate the discovery
mechanisms feature through the API. The following code shows how to leverage the
Java API client to create, list,
update and delete discovery mechanisms in Nexpose.
Nexpose supports Discovery connection API starting on version 5.2. The
supported operations on the API with regards to discovery ar
1 min
CVE-2012-0507 - Java Strikes Again
Recently, Microsoft published a blog post regarding a Java exploit that's being
used in the wild. The vulnerability is more of a logical flaw that results in
unsafe operations, which allows any attacker to run arbitrary code under the
context of the user. You may see the blog here:
http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sa
ndbox-breach-cve-2012-0507.aspx
About two days ago, Metasploit obtained a partial sample of that malware thanks
to an anonymous cont
3 min
Metasploit
Weekly Metasploit Update: DNS Payloads, Exploit-DB, and More
This week we've got a nifty new shellcode delivery scheme, we've normalized on
Exploit-DB serial numbers, and a pile of new modules, so if you don't have
Metasploit yet, you can snag it here .
DNS Payloads in TXT Records
To quote RFC 1464 describing DNS TXT
records, "it would be useful to take advantage of the widespread use and
scalability of the DNS to store information that has not been previously
defined." I don't kno
1 min
Metasploit
Identifying IPv6 Security Risks in IPv4 Networks: Tools
This post details some of the tools used in my recent IPv6 security testing
webcast If you have
any specific questions, please open a Discussion
thread.
A minimal IPv6 toolbox:
* A Linux-based operating system with IPv6 support
(BSD variants are great too)
* The IPv6 Attack Toolkit
2 min
Networking
SOC Monkey's Week in Review - 3.23.12
Hello all,
Every Friday I'm going to round up the week with a few of my favorite stories
that we've seen during the week on my app (SOC Monkey, available now, free in
the Apple App Store). Let's dive right in, shall we?
One of the biggest items of the week was the latest word from Facebook on
employers asking job applicants to reveal their passwords. Ars Technica's
article saw a lot of interest: Facebook says it may sue employers who demand
job
applicants' passwords