Posts tagged Metasploit Weekly Wrapup

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 7/5/19

Injecting the Time Machine From contributor timwr [https://github.com/timwr] comes a new module targeting Time Machine on macOS 10.14.3 and earlier. Specifically, the tmdiagnose binary for these vulnerable versions suffers from a command injection vulnerability that can be exploited via a specially crafted disk label. This new module uses an existing session for exploitation on the target, allowing the Framework user to run a payload as root. What’s on TV? If you are nearby to a vulnerable Supr

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 6/28/19

I am Root An exploit module [https://github.com/rapid7/metasploit-framework/pull/11987] for Nagios XI v5.5.6 was added by community contributor yaumn [https://github.com/yaumn]. This module includes two exploits chained together to achieve code execution with root privileges, and it all happens without authentication. A single unsanitized parameter in magpie_debug.php enables the ability to write arbitrary PHP code to a publicly accessible directory and get code execution. Privilege escalation

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 6/21/19

TLS support and expanded options for the BlueKeep scanner module, two new modules for Cisco Prime Infrastructure, and more.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 6/14/19

It’s Summertime, and the Hackin’ is Easy It is still early in the season, but there’s a whole lot of fixes that are already shipping. Straight off a week of intellectual synergy from the world-wide hackathon, we started to fix a lot of things we noticed while we coded over street tacos and Austin-famous beverages. All told, this week we made Metasploit more inclusive, transparent, and configurable! Inclusive @wvu-r7 has been on a roll trying to make Metasploit play well with others. He teamed u

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 6/7/19

Read up on how the recent community hackathon in Austin went, three new modules, and the usual long list of fixes and enhancements.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/31/19

Unauthenticated scanner for BlueKeep, community hackathon in Austin, and the usual long list of fixes and enhancements.

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/24/19

BSD love Outside of macOS, not many people run (or run into) a BSD-flavored system very often. Even still, bcoles [https://github.com/bcoles] and space-r7 [https://github.com/space-r7] teamed up for a pair of BSD enhancements. The first, a privilege escalation, affects FreeBSD's runtime linker dealing with LD_PRELOAD in FreeBSD 7.1, 7.2, and 8.0. The next enhancement adds BSD targets to our known-credential ssh executor which now allows BSD-specific payloads. Not wanting macOS to be left out ti

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up: May 17, 2019

Take a moment from this week's barrage of vulnerabilities in seemingly everything to see the cool stuff happening with the Metasploit team of contributors: a video interview between two greats, a new exploit module in GetSimple CMS, and a whole host of improvements.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/10/19

A new Chrome browser exploit, some WebLogic RCE, and an exploit for PostgreSQL. Also announcing the return of our annual Open-Source Security Meetup in Vegas!

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/3/19

Better persistence options thanks to two new modules for Yum and APT package managers. Plus, new exploits for Rails DoubleTap and Spring Cloud Config.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/26/19

Faster tab completion for `set PAYLOAD` and faster output for `show payloads`. Plus, four new exploits, including unauthenticated template injection for Atlassian Confluence and Ruby on Rails DoubleTap directory traversal.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/19/19

A more useful use command From among the many musings of longtime contributor/team member Brent Cook [https://github.com/busterb], in a combined effort with the ever-present wvu [https://github.com/wvu-r7], the use command has become so much more useful. PR 11724 [https://github.com/rapid7/metasploit-framework/pull/11724] takes new functionality [https://github.com/rapid7/metasploit-framework/pull/11652] from search -u one step further by automatically appying it when use is called with a uniq

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/12/19

WordPress RCE tiyeuse [https://github.com/tiyeuse] submitted a Metasploit module [https://github.com/rapid7/metasploit-framework/pull/11587] for an authenticated remote code execution vulnerability in WordPress, which was described in a blog post by RIPS Technology [https://www.sonarsource.com/blog/]. After authenticating as a user with at least author privileges, the module starts by uploading an image file with PHP code that will be used later. Then the image metadata that references the file

2 min Metasploit

Metasploit Wrap-Up 4/5/19

Your workflow just got easier Are you tired of copy/pasting module names from the search results before you can use them? Thanks to this enhancement (PR #11652) [https://github.com/rapid7/metasploit-framework/pull/11652] by Brent Cook [https://github.com/busterb], you can now run search with the -u flag to automatically use a module if there is only one result. Now you're one step closer to popping a shell! A pair of new JSO modules Metasploit published research a few weeks ago on Java Serializ

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/29/19

Introducing Metasploit Development Diaries We are happy to introduce a new quarterly series, the Metasploit Development Diaries. The dev diaries walk users and developers through some example exploits and give detailed analysis of how the exploits operate and how Metasploit evaluates vulnerabilities for inclusion in Framework. The first in the dev diaries series features technical analysis by sinn3r [https://twitter.com/_sinn3r?lang=en] and includes modules from community members and fellow rese