1 min
Metasploit Weekly Wrapup
Metasploit Wrapup 1/19/18
Metasploit 5 Development Has Begun
It's 2018, the ice is melting in Austin, and as we hinted last October
[/2017/10/13/metasploit-wrapup-metasploit-5-or-bust/], Metasploit 5 development
efforts have begun in earnest. We have a laundry list
[https://github.com/rapid7/metasploit-framework/pull/9259] of features that we
are working on for it. The first feature merged in Metasploit 5
[https://github.com/rapid7/metasploit-framework/pull/9220] replaces the module
cache, which decreases the memory used
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Jan. 12, 2018
'Sploits! Get yer 'sploits heeere!
Lots of fresh modules this week with six shiny new exploits to showcase—but
first, a blast from the past:
1992 Called
Solaris wants to help you get password hashes and they've invented the NIS
[https://en.wikipedia.org/wiki/Network_Information_Service] protocol. The next
time you find a Solaris box, locked in a closet, that three generations of
sysadmins have been afraid to touch, you can dump hashes straight to your
Metasploit loot [https://github.com/rapi
3 min
Metasploit Weekly Wrapup
Metasploit Wrapup 1/5/18
2018: a new year, new vulns, and endless opportunities to exploit them. The
Metasploit community is kicking off the year with a variety of new content,
functionality, research, and coordinated vulnerability disclosure.
New Year, New Vulns
After a couple months of coordinated disclosure work, long-time Metasploit
contributor Karn Ganeshen [https://twitter.com/juushya] offered up a handful of
modules and a couple mixins for testing wireless routers from Cambium Networks
[https://www.cambiumnetwor
7 min
Haxmas
12 Memorable Metasploit Moments of 2017
This HaXmas, we delve into 12 Memorable Metasploit Moments from 2017 that inspired us, impressed us, and made us feel more connected to our global community of contributors, users, and friends.
6 min
Haxmas
Regifting Python in Metasploit
Metasploit has been taking random Python scripts off the internet and passing them off as modules! Well, not exactly. Read on to see how we're extending the module system's scalability and what Python has to do with that.
3 min
Haxmas
HaXmas: The True Meaning(s) of Metasploit
Rapid7 Research Director Tod Beardsley kicks off our storied "12 Days of HaXmas" series with a thrilling tale of browser 0day, exploit module development, and the true meaning(s) of Metasploit.
3 min
Metasploit
Metasploit Wrapup: Dec. 22, 2017
Even with the year winding down to a close, activity around Metasploit has been
decidedly “hustle and bustle”. Some cool new things to talk about this week, so
sit back and dig in!
For Your iOS Only
If you’ve been wanting to run Meterpreter under iOS, then this bit is for you!
While Mettle has technically worked on iOS
[https://github.com/rapid7/mettle/pull/54] since February, @timwr
[https://github.com/timwr] has added official Metasploit Framework support
[https://github.com/rapid7/metasploit
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Dec. 15, 2017
I Read the News Today, Oh Boy
As we near the end of the year we must express appreciation for the Metasploit
community as a whole. Each contribution is valuable, be it an exploit for the
latest vulnerability, documentation, spelling corrections, or anything in
between. Together we shape the future of Metasploit. The Metasploit community
really surprised us this time around, as the latest release brings five new
exploit and two new auxiliary modules.
Hey! You! Get Off of My Cloud
Zenofex [https:
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Dec. 8, 2017
Have you ever been on a conference call where you really wished you could take
command of the situation? With Metasploit Framework and the new Polycom HDX
exploit, you can (if given permission by the owner of the device, that is)! If
teleconferencing isn't your target's style, you can also pwn correspondence the
old-fashioned way: through a Microsoft Office exploit. Be it written or video,
we here at Rapid7 know you value other people's communication!
After another Python module and the Mac r
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Dec. 1, 2017
Here in the U.S., we just celebrated Thanksgiving, which involves being thankful
[/2017/11/17/metasploit-wrapup-17/], seeing friends and family, and eating
entirely too much (I know that last one is not uncommon here). After a large
meal and vacation, we figured that it would be a nice, slow week for security
research in the States. Then we opened Twitter and were suddenly happy we had
procrastinated and most of us had put off upgrading to High Sierra.
Community CTF
In case you missed yesterd
2 min
Metasploit
Announcing the Metasploitable3 Community CTF
Been waiting for the Linux version of Metasploitable3 to drop? We’ll do you one
better: Metasploit is giving the community a week to rain shells on a
penguin-shaped Metasploitable3 instance—and to win prizes at the end of it. Play
starts December 4; see below for full competition details.
TL;DR: Sign up, drop shells, win stuff.
Not into capturing flags but jonesing for a look at the code? We’ll release the
Linux Metasploitable3 source code to the community soon after the competition
ends. Happ
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Nov. 17, 2017
This is a time of year when many folks in the U.S. reflect on things in their
lives that they are thankful for. There’s also usually a turkey involved, but we
figured we’d pardon the bird
[https://en.wikipedia.org/wiki/National_Thanksgiving_Turkey_Presentation] this
wrapup and just focus on things we Metasploit folks here at Rapid7 are thankful
for.
Community Contributors
We are SUPER THANKFUL for our community contributors
[https://github.com/rapid7/metasploit-framework/graphs/contributors] an
4 min
Penetration Testing
Metasploit MinRID Option
We’ve added a new option to the smb_lookupsid Metasploit module
[https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_lookupsid]. You can
now specify your starting RID.
Wait, What Does This Module Do Again?
As a penetration tester, one of the first things I try to do on an internal
network is enumerate all of the domain users so that I can perform login attacks
against them. It would be a noteworthy risk if we could do that anonymously,
because that means that any malicious actor who can
2 min
Metasploit Weekly Wrapup
Metasploit Wrapup: Nov. 11, 2017
Metasploit kicked November off to a roaring start with a wholesome dose of RCE,
LPE, command injection, DoS, and more fixes/improvements.
So many file choosers…but which one to choose?
Big ups to @RootUP for the DoS module
[https://github.com/rapid7/metasploit-framework/pull/9060] targeting a
vulnerability in IBM’s Lotus Notes [https://en.wikipedia.org/wiki/IBM_Notes]
client (CVE-2017-1130). The DoS module targets the web interface via malicious
JavaScript (😱). An enterprising ‘sploiter can s
5 min
Metasploit
Testing Developer Security with Metasploit Pro Task Chains
In this modern age, technology continues to make inroads into all sorts of
industries. Everything from smartphones to late-model automobiles to
internet-connected toasters requires software to operate, and this proliferation
of software has brought along gaggles of software developers with their
tools-of-the-trade. All this technology —not to mention the people utilizing it—
can result in an increased attack surface for organizations doing software
development.
In this blog post, we’ll explore