Posts tagged Metasploit

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/26/19

Faster tab completion for `set PAYLOAD` and faster output for `show payloads`. Plus, four new exploits, including unauthenticated template injection for Atlassian Confluence and Ruby on Rails DoubleTap directory traversal.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/19/19

A more useful use command From among the many musings of longtime contributor/team member Brent Cook [https://github.com/busterb], in a combined effort with the ever-present wvu [https://github.com/wvu-r7], the use command has become so much more useful. PR 11724 [https://github.com/rapid7/metasploit-framework/pull/11724] takes new functionality [https://github.com/rapid7/metasploit-framework/pull/11652] from search -u one step further by automatically appying it when use is called with a uniq

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/12/19

WordPress RCE tiyeuse [https://github.com/tiyeuse] submitted a Metasploit module [https://github.com/rapid7/metasploit-framework/pull/11587] for an authenticated remote code execution vulnerability in WordPress, which was described in a blog post by RIPS Technology [https://www.sonarsource.com/blog/]. After authenticating as a user with at least author privileges, the module starts by uploading an image file with PHP code that will be used later. Then the image metadata that references the file

2 min Metasploit

Metasploit Wrap-Up 4/5/19

Your workflow just got easier Are you tired of copy/pasting module names from the search results before you can use them? Thanks to this enhancement (PR #11652) [https://github.com/rapid7/metasploit-framework/pull/11652] by Brent Cook [https://github.com/busterb], you can now run search with the -u flag to automatically use a module if there is only one result. Now you're one step closer to popping a shell! A pair of new JSO modules Metasploit published research a few weeks ago on Java Serializ

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/29/19

Introducing Metasploit Development Diaries We are happy to introduce a new quarterly series, the Metasploit Development Diaries. The dev diaries walk users and developers through some example exploits and give detailed analysis of how the exploits operate and how Metasploit evaluates vulnerabilities for inclusion in Framework. The first in the dev diaries series features technical analysis by sinn3r [https://twitter.com/_sinn3r?lang=en] and includes modules from community members and fellow rese

2 min Metasploit

Introducing the Metasploit Development Diaries

In our new Metasploit Development Diaries series, we will share stories of how exploitable conditions become stable, seasoned Metasploit Framework modules.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up: Mar. 22, 2019

Spring is here: Four new modules and metashell improvements.

1 min Research

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

In our new research report, we take a look at Java Serialized Objects (JSOs), which are a reliable threat vector and present a rising threat to enterprise networks.

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/15/19

elFinder remote command injection elFinder [https://github.com/Studio-42/elFinder] is a client-side open-source file manager tool written for web applications. In a browser it has the look and feel of a native file manager application. It ships with a PHP connector [https://github.com/Studio-42/elFinder/tree/master/php], which integrates the client side with the back end server. The connector provides the ability for unauthenticated users to upload an image and resize it. It does so by shelling

3 min Metasploit

Metasploit Wrap-Up 3/8/19

The Payload UUID and paranoid mode Meterpreter payload and listener features were first introduced and added to many HTTP and TCP Metasploit payloads in mid-2015.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/1/19

An improvement to HTTP command stagers allows exploits to write on-disk stagers to the location of your choosing.

4 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 2/22/19

Document ALL THE THINGS! This release sees quite a bit of documentation added with a module doc from bcoles and four new module docs from newer docs contributor Yashvendra [https://github.com/Yashvendra]. Module docs can be viewed with info -d and are extremely helpful for getting acquainted with a modules capabilities and limitations. We greatly value these contributions because, while not cool h4x0r features by themselves, each one means that fewer people have to read the code to understand ho

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 2/15/19

Crock-Pot cooking with Metasploit Belkin's Wemo [https://en.wikipedia.org/wiki/Belkin_Wemo] line of smart home devices offers users a variety of internet-connected gadgets and gizmos they can control around the home. One of those happens to be a Crock-Pot [https://www.crock-pot.com/on/demandware.store/Sites-crockpot-Site/default/Support-Show?cfid=wemo-how-to-videos] . We went ahead and bought one. Naturally, it made sense for us to write a module [https://github.com/rapid7/metasploit-framework/

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 2/8/19

Ubiquitous Devices Our Rapid7 Labs team pulled the thread [https://www.rapid7.com/blog/post/2019/02/01/ubiquiti-discovery-service-exposures/] on some recent buzz around exploitable Ubiquiti devices, which led to a new scanner module [https://github.com/rapid7/metasploit-framework/pull/11338] ( auxiliary/scanner/ubiquiti/ubiquiti_discover.rb) from jhart-r7 [https://github.com/jhart-r7]. This module uses a simple UDP protocol to identify potentially exploitable Ubiquiti devices on your network, a

2 min Metasploit

Metasploit Wrapup 1/25/19

Hi everyone! For those in the US, hope you all had a great MLK weekend. We have a pretty light release due to the holiday, but we still have some cool stuff in the house. Check it out!