All Posts

1 min

Getting the Most From Customizable CSV Exports - Part 8

Good Day! I am Eric Pattenden, a Sales Engineer with Rapid7. Today I bring you two additional use cases for the recently improved CSV data export capability featured in Nexpose . The Nexpose CSV Export can now be customized to show only desired data for discovered vulnerabilities and t

3 min Metasploit

Weekly Metasploit Update: Back to Work!

Hey, it's the first post-Metasploit 4.3.0 update, which means that I'm back in the blogging business. Huzzah! We've all been heads-down for a while getting this bad boy out the door, so while there's not a ton of new functionality to talk about this week, we do have some neat new modules, and one API change for module developers. Wake On LAN "The most secure computer is the one that's not turned on," is an old computer security adage, speaking to the compl

3 min

Getting the Most From Customizable CSV Exports - Part 5

Coming to you, live from Rapid7, my name is Chris Godoy and I work on the Security Solutions team here in Boston. My colleagues and I have been posting creative ways to take advantage of Nexpose's new and improved CSV export options . It allows you to easily extract vital pieces of metadata from your vulnerability scans that may not be clearly depicted in our out of the box (or customizable) reports. Now you can decide exactly what data fields you would like to have at your fingertips to manipu

3 min

Getting the Most from Customizable CSV Exports - Part 4

Hi SecurityStreet, let me introduce myself. I've been an Enterprise Security Engineer at Rapid7 for almost two years now, and have seen fads come and go. Think 0-day Flash updates (ok – maybe not; to Adobe's credit – they've significantly decreased their bugs as time goes on), but one theme has been consistent – how the @#$% do I go about analyzing risk? Analyzing risk is one of the most difficult aspects of any good risk assessment program: risk can be broken down by device, asset classificat

1 min

Getting the Most from Customizable CSV Exports - Part 3

Hello Community! As part of the Security Solutions team here at Rapid7, I get to work day in and day out with Nexpose users, helping them address the challenges they face. Nexpose can generate a tremendous amount of great, actionable risk data.  On Monday my colleague, Sean Blanton, posted a blog on the new CSV export capabilities in Nexpose. Throughout this week and next, the Security Solutions team is posting examples of how

2 min Nexpose

Getting the Most from Customizable CSV Exports - Part 2

Hi there SecurityStreet! As a Technical Proposal Writer for Rapid7, I get to do technical deep dives of Nexpose with our Engineering and Security Solutions teams. Lately I've had a lot of chances to describe the enhanced CSV exports we've added in Nexpose 5.2, but up until now I haven't gotten the chance to really show off their capabilities. As Sean Blanton said in our first demonstration of the new CSV export capabilities, us

1 min Networking

A Penetration Test is Quality Assurance for Your Security Controls

“We've spent all this money on IT security and you're still telling me that you don't know whether our systems are secure?” your CEO might say. In addition, they may challenge that you should know your systems well enough to know their weaknesses? Not really. Let's say you're a manufacturer of widgets. Even if you have the best machine and the brightest people working for you, you'll still want to ensure that the widgets that leave the factory will work as expected to ensure high customer sat

1 min Networking

Leveraging Security Risk Intelligence to Improve Your Security Posture

As most of you probably know, attackers routinely target exploitable weaknesses of security systems rather than pre-identifying victims for their attacks. Also, most breaches that occur in database security systems are avoidable without expensive or sophisticated countermeasures. In its 2012 Data Breach Investigations Report, Verizon registered 174 million compromised records for 2011, compar

3 min Nexpose

How to Secure Your Videoconferencing Systems: H.323 Scanning with Rapid7 Nexpose

For my inaugural post on the SecurityStreet blog, I thought it would be beneficial to highlight the H.323 coverage I recently added to Nexpose. With all the attention HD Moore's work in this area garnered, it seemed that there was a definite need for this functionality, so as of Nexpose 5.2, users can scan their networks for devices running H.323 services as well as detect whether those services have the auto-answer functionality enable

4 min Metasploit

Weekly Metasploit Update: SCADA, Lab Gem, and Squid Pivoting

This week's update is packed full of awesome, and I don't use that term lightly. SCADA Attacks, DigtialBond, and Metasploit This week sees the addition of six new SCADA modules, targeting a variety of PLC devices, including two new modules aimed at the Schneider Quantum programmable logic controller (PLC).  In order to give penetration testers the ability to accurately assess SCADA infrastructure, Tod Beardsley (from Rapid7) and K. Reid Wightman (from Digit

2 min Nexpose

Automating Nexpose Discovery Connections through the Java API

Nexpose has long offered APIs allowing for automated workflow operations. The following examples are intended to help Nexpose users automate the discovery mechanisms feature through the API. The following code shows how to leverage the Java API client to create, list, update and delete discovery mechanisms in Nexpose. Nexpose supports Discovery connection API starting on version 5.2.  The supported operations on the API with regards to discovery ar

1 min

CVE-2012-0507 - Java Strikes Again

Recently, Microsoft published a blog post regarding a Java exploit that's being used in the wild.  The vulnerability is more of a logical flaw that results in unsafe operations, which allows any attacker to run arbitrary code under the context of the user.  You may see the blog here: http://blogs.technet.com/b/mmpc/archive/2012/03/20/an-interesting-case-of-jre-sa ndbox-breach-cve-2012-0507.aspx About two days ago, Metasploit obtained a partial sample of that malware thanks to an anonymous cont

3 min Metasploit

Weekly Metasploit Update: DNS Payloads, Exploit-DB, and More

This week we've got a nifty new shellcode delivery scheme, we've normalized on Exploit-DB serial numbers, and a pile of new modules, so if you don't have Metasploit yet, you can snag it here . DNS Payloads in TXT Records To quote RFC 1464 describing DNS TXT records, "it would be useful to take advantage of the widespread use and scalability of the DNS to store information that has not been previously defined." I don't kno

1 min Metasploit

Identifying IPv6 Security Risks in IPv4 Networks: Tools

This post details some of the tools used in my recent IPv6 security testing webcast If you have any specific questions, please open a Discussion thread. A minimal IPv6 toolbox: * A Linux-based operating system with IPv6 support (BSD variants are great too) * The IPv6 Attack Toolkit

2 min Networking

SOC Monkey's Week in Review - 3.23.12

Hello all, Every Friday I'm going to round up the week with a few of my favorite stories that we've seen during the week on my app (SOC Monkey, available now, free in the Apple App Store). Let's dive right in, shall we? One of the biggest items of the week was the latest word from Facebook on employers asking job applicants to reveal their passwords. Ars Technica's article saw a lot of interest: Facebook says it may sue employers who demand job applicants' passwords