3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 8/3/18
Meterpreter on Axis
Everyone loves shells, but Meterpreter sessions are always better. Thanks to
William Vu, the axis_srv_parhand_rce
[https://github.com/rapid7/metasploit-framework/pull/10409] module is now
capable of giving you a Meterpreter session instead of a regular shell with
netcat.
DLL Injection for POP/MOV SS
Another awesome improvement is Brendan Watters' work on the POP/MOV SS exploit
[https://github.com/rapid7/metasploit-framework/pull/10387] against Windows
(CVE-2018-8897), also k
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 7/27/18
CMS Exploitation Made Simple
"CMS Made Simple" is an open-source Content Management System. Mustafa Hasen
discovered and reported [http://dev.cmsmadesimple.org/bug/view/11741] that
versions 2.2.5 and 2.2.7 include a vulnerability in file uploads that permit an
authenticated attacker to gain execution of arbitrary PHP scripts. The
multi/http/cmsms_upload_rename_rce
[https://www.rapid7.com/db/modules/exploit/multi/http/cmsms_upload_rename_rce]
exploit module uses our PHP Meterpreter to gain full
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 7/20/18
Privilege Escalation
Linux BPF
CVE-2017-16995 [https://nvd.nist.gov/vuln/detail/CVE-2017-16995] is a Linux
kernel vulnerability in the way that a Berkeley Packet Filter (BPF) is verified.
Multiple sign extension bugs allows memory corruption by unprivileged users,
which could be used for a local privilege escalation attack by overwriting a
credential structure in memory to gain root access to a compromised host. The
bpf_sign_extension_priv_esc module
[https://github.com/rapid7/metasploit-framew
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 7/13/18
Committing to some shells in GitList
Shelby [https://github.com/space-r7] has been killing it with new exploit and
aux modules by the day. In this iteration, she's produced an exploit
[https://github.com/rapid7/metasploit-framework/pull/10262] for GitList 0.6.0
and likely older versions. The software is built on PHP and allows users to view
a Git repo on the web. Through an argument injection, a fake pager
[https://en.wikipedia.org/wiki/Terminal_pager] can be executed... that is really
our shell
1 min
Metasploit
Metasploit Wrapup 7/6/18
New Modules
Exploit modules (3 new)
* Nagios XI Chained Remote Code Execution
[https://www.rapid7.com/db/modules/exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo]
by Benny Husted [https://github.com/BennyHusted], Cale Smith
[https://github.com/caleBot], and Jared Arave
[https://www.exploit-db.com/author/?a=9106], which exploits CVE-2018-8736.
Monitor this series of unfortunate events all the way to magical shells.
* Boxoft WAV to MP3 Converter v1.1 Buffer Overflow
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 6/29/18
Moar Power
OJ Reeves [https://github.com/OJ] added
[https://github.com/rapid7/metasploit-framework/pull/10206] two new PowerShell
transport functions to Metasploit payloads and made modifications to the
PowerShell transport binding functionality. The aptly-named Add-TcpTransport
function adds an active TCP transport to the current session and the
Add-WebTransport function adds an HTTP/S transport to the current session. These
functions are fully documented, allowing the user to leverage the Ge
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 6/22/18
Welcome to another installment of the week! This installment features a new
ETERNALBLUE module in everyone's favorite reptile-brain language, Python!
Sporting support for Windows 8 and 10, it has everything you need, including
immutable strings and enforced whitespace.
In other Windows 10 news, chervalierly [https://github.com/chervaliery] fixed an
annoying bug in rex-powershell that prevented PsExec from working on later
versions of Windows 10. Now, you can PsExec to your heart’s content. Go f
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 6/15/18
New Privilege Escalation Exploit
The glibc 'realpath()' module
[https://github.com/rapid7/metasploit-framework/pull/10101] was added by bcoles
[https://github.com/bcoles]. It attempts to gain root privileges on Debian-based
Linux systems by exploiting a vulnerability in GNU C Library (glibc) version <=
2.26. This exploit uses halfdog's [https://github.com/halfdog] RationalLove
exploit to expose a buffer underflow error in glibc realpath() and create a SUID
root shell. The module includes offset
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 6/8/18
Just Let Me Grab My Popcorn First
This week, rmdavy [https://github.com/rmdavy] contributed a pair of modules
designed to fool Windows into authenticating to you so you can capture sweet,
sweet NetNTLM hashes. BadODT
[https://github.com/rapid7/metasploit-framework/pull/10067] targets
LibreOffice/Apache OpenOffice by providing a link to an image on a network
share, and the new Multi Dropper
[https://github.com/rapid7/metasploit-framework/pull/10115] creates all sorts of
files Windows itself lov
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup 6/1/18
Upgrade Your SOCKS
Thanks to zeroSteiner [https://github.com/zeroSteiner], we have some very nice
additions to the SOCKS5 library this week. His changes enabled BIND connections
through the SOCKS5 proxy
[https://github.com/rapid7/metasploit-framework/pull/9990], improved automated
testing around the code, and broke it up into more manageable, targeted
submodules. Now that Trevor’s dying wish
[https://twitter.com/Bandrel/status/912312568055771137] has been fulfilled, the
team can finally leave
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 5/25/18
Bonjour!
Que désirez-vous?
We want to know what you'd like to see out of our latest Metasploit
improvements. Please take a moment to fill out our community survey to help
shape Metasploit's new backend data service. Tell us how you use the Metasploit
database, which Metasploit data you use with other tools, how you need to store
data from modules you've written, and so on. Please take our survey!
[https://docs.google.com/forms/d/e/1FAIpQLSckVYKP9qVg_VSQcYPoFaYperYFBfmjfZXwi6jIxDokdext6Q/viewfor
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 5/18/18
You Compile Me
Our very own wchen-r7 [https://github.com/wchen-r7] added the ability to compile
C code in metasploit, including (select) dependencies by creating a wrapper for
metasm. Right now, support for windows.h is the first salvo in custom compiling
tools within the metasploit interface!
Hack all the things!
For a long time, people have asked us to support RHOSTS in exploits just like we
do in AUX modules. We listened, and now framework exploits support RHOSTS! Set
your exploit, your
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: 5/11/18
Chaining Vulnerabilities
Philip Pettersson discovered vulnerabilities in certain PAN OS versions
[http://seclists.org/fulldisclosure/2017/Dec/38] that could lead to remote code
execution and hdm wrote a Metasploit module for the exploit chain
[https://github.com/rapid7/metasploit-framework/pull/9980]. The exploit chain
starts off with an authentication bypass, which allows the module to access a
page that is vulnerable to an XML injection. This page is then used to create a
directory where a pay
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 5/4/18
May the fourth be with you…
Get comfortable, put on your headphones or turn up your speaker volume, and
enjoy this guitar rendition [https://www.youtube.com/watch?v=CBZgLM5HUzU] of the
Ewok Celebration, commonly known as Yub Nub
[https://starwars.fandom.com/wiki/Ewok_Celebration] while catching up on
Metasploit updates for the week.
PHP Debugging
Xdebug [https://xdebug.org/] is an extension for PHP to facilitate development
by providing interactive debugging capabilities and much more. On an
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 4/27/18
After last week's seriously serious write-up
[https://www.rapid7.com/blog/post/2018/04/20/metasploit-wrapup-36/], this week
we will return to our norml normal, lighthearted (and Metasploit-hearted)
wrap-ups, though we remain fans of terrible 80s movies.
Drupalgeddon 2: Webdev Boogaloo
After last month's Drupal exploit came to light, nearly a dozen developers have
been hard at work to add a module targeting CVE-2018-7600
[https://www.rapid7.com/db/vulnerabilities/drupal-cve-2018-7600]. You can