2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 4/19/19
A more useful use command
From among the many musings of longtime contributor/team member Brent Cook
[https://github.com/busterb], in a combined effort with the ever-present wvu
[https://github.com/wvu-r7], the use command has become so much more useful. PR
11724 [https://github.com/rapid7/metasploit-framework/pull/11724] takes new
functionality [https://github.com/rapid7/metasploit-framework/pull/11652] from
search -u one step further by automatically appying it when use is called with a
uniq
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 4/12/19
WordPress RCE
tiyeuse [https://github.com/tiyeuse] submitted a Metasploit module
[https://github.com/rapid7/metasploit-framework/pull/11587] for an authenticated
remote code execution vulnerability in WordPress, which was described in a blog
post by RIPS Technology [https://www.sonarsource.com/blog/]. After
authenticating as a user with at least author privileges, the module starts by
uploading an image file with PHP code that will be used later. Then the image
metadata that references the file
2 min
Metasploit
Metasploit Wrap-Up 4/5/19
Your workflow just got easier
Are you tired of copy/pasting module names from the search results before you
can use them? Thanks to this enhancement (PR #11652)
[https://github.com/rapid7/metasploit-framework/pull/11652] by Brent Cook
[https://github.com/busterb], you can now run search with the -u flag to
automatically use a module if there is only one result. Now you're one step
closer to popping a shell!
A pair of new JSO modules
Metasploit published research a few weeks ago on Java Serializ
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 3/29/19
Introducing Metasploit Development Diaries
We are happy to introduce a new quarterly series, the Metasploit Development
Diaries. The dev diaries walk users and developers through some example exploits
and give detailed analysis of how the exploits operate and how Metasploit
evaluates vulnerabilities for inclusion in Framework. The first in the dev
diaries series features technical analysis by sinn3r
[https://twitter.com/_sinn3r?lang=en] and includes modules from community
members and fellow rese
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up: Mar. 22, 2019
Spring is here: Four new modules and metashell improvements.
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 3/15/19
elFinder remote command injection
elFinder [https://github.com/Studio-42/elFinder] is a client-side open-source
file manager tool written for web applications. In a browser it has the look and
feel of a native file manager application. It ships with a PHP connector
[https://github.com/Studio-42/elFinder/tree/master/php], which integrates the
client side with the back end server. The connector provides the ability for
unauthenticated users to upload an image and resize it. It does so by shelling
3 min
Metasploit
Metasploit Wrap-Up 3/8/19
The Payload UUID and paranoid mode Meterpreter payload and listener features were first introduced and added to many HTTP and TCP Metasploit payloads in mid-2015.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 3/1/19
An improvement to HTTP command stagers allows exploits to write on-disk stagers to the location of your choosing.
4 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/22/19
Document ALL THE THINGS!
This release sees quite a bit of documentation added with a module doc from
bcoles and four new module docs from newer docs contributor Yashvendra
[https://github.com/Yashvendra]. Module docs can be viewed with info -d and are
extremely helpful for getting acquainted with a modules capabilities and
limitations. We greatly value these contributions because, while not cool h4x0r
features by themselves, each one means that fewer people have to read the code
to understand ho
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/15/19
Crock-Pot cooking with Metasploit
Belkin's Wemo [https://en.wikipedia.org/wiki/Belkin_Wemo] line of smart home
devices offers users a variety of internet-connected gadgets and gizmos they can
control around the home. One of those happens to be a Crock-Pot
[https://www.crock-pot.com/on/demandware.store/Sites-crockpot-Site/default/Support-Show?cfid=wemo-how-to-videos]
. We went ahead and bought one.
Naturally, it made sense for us to write a module
[https://github.com/rapid7/metasploit-framework/
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/8/19
Ubiquitous Devices
Our Rapid7 Labs team pulled the thread
[https://www.rapid7.com/blog/post/2019/02/01/ubiquiti-discovery-service-exposures/]
on some recent buzz around exploitable Ubiquiti devices, which led to a new
scanner module [https://github.com/rapid7/metasploit-framework/pull/11338] (
auxiliary/scanner/ubiquiti/ubiquiti_discover.rb) from jhart-r7
[https://github.com/jhart-r7]. This module uses a simple UDP protocol to
identify potentially exploitable Ubiquiti devices on your network, a
2 min
Metasploit
Metasploit Wrapup 1/25/19
Hi everyone! For those in the US, hope you all had a great MLK weekend. We have a pretty light release due to the holiday, but we still have some cool stuff in the house. Check it out!
1 min
Metasploit
Metasploit Wrapup 1/18/19
This week, phra offers up a new potato dish to make privilege escalation in Windows just a bit tastier.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 1/12/19
MSF 5 in the wild
We announced the release
[https://www.rapid7.com/blog/post/2019/01/10/metasploit-framework-5-0-released/]
of Metasploit Framework 5.0 this week. It’s Metasploit’s first major version
release since 2011, and it includes lots of good stuff the team has been working
on for the past year-plus. It will be packaged and integrated into your favorite
software distributions over the next few months; until then, you can get MSF 5
by checking out the 5.0.0 tag
[https://github.com/rapid7/
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 1/4/19
Happy New Year to the Metasploit community! As we kick off 2019, we're excited
to see all the modules, enhancements, and discussions the new year will bring.
Ring In 2019 With SSL
There is a new datastore option
[https://github.com/rapid7/metasploit-framework/pull/11160] courtesy of wvu
[https://github.com/wvu-r7] called CMDSTAGER::SSL. This exposes the ability to
enable SSL/TLS command stagers with set cmdstager::ssl true.
Auld Erlang Syne
Good news if you're a fan of the multi/misc/erlang_co