Posts tagged Metasploit

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/24/19

BSD love Outside of macOS, not many people run (or run into) a BSD-flavored system very often. Even still, bcoles [https://github.com/bcoles] and space-r7 [https://github.com/space-r7] teamed up for a pair of BSD enhancements. The first, a privilege escalation, affects FreeBSD's runtime linker dealing with LD_PRELOAD in FreeBSD 7.1, 7.2, and 8.0. The next enhancement adds BSD targets to our known-credential ssh executor which now allows BSD-specific payloads. Not wanting macOS to be left out ti

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up: May 17, 2019

Take a moment from this week's barrage of vulnerabilities in seemingly everything to see the cool stuff happening with the Metasploit team of contributors: a video interview between two greats, a new exploit module in GetSimple CMS, and a whole host of improvements.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/10/19

A new Chrome browser exploit, some WebLogic RCE, and an exploit for PostgreSQL. Also announcing the return of our annual Open-Source Security Meetup in Vegas!

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 5/3/19

Better persistence options thanks to two new modules for Yum and APT package managers. Plus, new exploits for Rails DoubleTap and Spring Cloud Config.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/26/19

Faster tab completion for `set PAYLOAD` and faster output for `show payloads`. Plus, four new exploits, including unauthenticated template injection for Atlassian Confluence and Ruby on Rails DoubleTap directory traversal.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/19/19

A more useful use command From among the many musings of longtime contributor/team member Brent Cook [https://github.com/busterb], in a combined effort with the ever-present wvu [https://github.com/wvu-r7], the use command has become so much more useful. PR 11724 [https://github.com/rapid7/metasploit-framework/pull/11724] takes new functionality [https://github.com/rapid7/metasploit-framework/pull/11652] from search -u one step further by automatically appying it when use is called with a uniq

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 4/12/19

WordPress RCE tiyeuse [https://github.com/tiyeuse] submitted a Metasploit module [https://github.com/rapid7/metasploit-framework/pull/11587] for an authenticated remote code execution vulnerability in WordPress, which was described in a blog post by RIPS Technology [https://www.sonarsource.com/blog/]. After authenticating as a user with at least author privileges, the module starts by uploading an image file with PHP code that will be used later. Then the image metadata that references the file

2 min Metasploit

Metasploit Wrap-Up 4/5/19

Your workflow just got easier Are you tired of copy/pasting module names from the search results before you can use them? Thanks to this enhancement (PR #11652) [https://github.com/rapid7/metasploit-framework/pull/11652] by Brent Cook [https://github.com/busterb], you can now run search with the -u flag to automatically use a module if there is only one result. Now you're one step closer to popping a shell! A pair of new JSO modules Metasploit published research a few weeks ago on Java Serializ

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/29/19

Introducing Metasploit Development Diaries We are happy to introduce a new quarterly series, the Metasploit Development Diaries. The dev diaries walk users and developers through some example exploits and give detailed analysis of how the exploits operate and how Metasploit evaluates vulnerabilities for inclusion in Framework. The first in the dev diaries series features technical analysis by sinn3r [https://twitter.com/_sinn3r?lang=en] and includes modules from community members and fellow rese

2 min Metasploit

Introducing the Metasploit Development Diaries

In our new Metasploit Development Diaries series, we will share stories of how exploitable conditions become stable, seasoned Metasploit Framework modules.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up: Mar. 22, 2019

Spring is here: Four new modules and metashell improvements.

1 min Research

A Serial Problem: Exploitation and Exposure of Java Serialized Objects

In our new research report, we take a look at Java Serialized Objects (JSOs), which are a reliable threat vector and present a rising threat to enterprise networks.

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/15/19

elFinder remote command injection elFinder [https://github.com/Studio-42/elFinder] is a client-side open-source file manager tool written for web applications. In a browser it has the look and feel of a native file manager application. It ships with a PHP connector [https://github.com/Studio-42/elFinder/tree/master/php], which integrates the client side with the back end server. The connector provides the ability for unauthenticated users to upload an image and resize it. It does so by shelling

3 min Metasploit

Metasploit Wrap-Up 3/8/19

The Payload UUID and paranoid mode Meterpreter payload and listener features were first introduced and added to many HTTP and TCP Metasploit payloads in mid-2015.

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 3/1/19

An improvement to HTTP command stagers allows exploits to write on-disk stagers to the location of your choosing.