2 min
Metasploit
Webcast: Don't Pick the Lock, Steal the Key - Password Auditing With Metasploit
David Maloney's webcast for for network administrators and security engineers is
now available online. David discusses weaknesses in password-based
authentication on clients and servers and how to audit these as part of a
regular security program.
What you'll learn in this webcast
* Password storage systems and password obfuscation
* Strengths and weaknesses of the various approaches
* Real-life examples of badly implemented password authentication mechanisms
* How to audit passwords on
4 min
Metasploit
Can't Exploit Machines? A Metasploit Troubleshooting How To
It can be very frustrating to try exploiting machines and not succeeding,
especially if your vulnerability report is showing a lot of vulnerabilities on
the hosts you are trying to exploit. This is usually due to one of the following
reasons:
1. Not all reported vulnerabilities are exploitable. It may be because a
firewall or IPS/IDS is successfully stopping the attack, or simply because
your vulnerability scanner reported a false positive.
2. Your Metasploit machine or network connec
2 min
Metasploit
Weekly Metasploit Update: Dev Docs and More!
This week in the U.S. is the unofficial start of summer, so that probably
explains why it's been a bit of a slow week in the Metasploit community,
hacking-wise. We have a few new modules
[http://www.rapid7.com/downloads/metasploit.jsp] for this week's update, but in
addition to those, I'd like to mention a few new resources we've put together
for the Metasploit development community.
Docs and Videos
Over the last few weeks, we've been working up some more comprehensive
documentation on how to g
3 min
Metasploit
Using BackTrack 5 R2 with Metasploit Community or Metasploit Pro
As of version 5 R2, BackTrack comes pre-installed with Metasploit 4.1.4, so it's
now easier to use Metasploit Community Edition or Metasploit Pro on BackTrack.
Here is how it's done:
* After BackTrack boots, enter startx to get into the UI.
* Install BackTrack in a virtual machine using the Install BackTrack icon in
the top left corner. This is recommended so that Metasploit remembers its
product key; otherwise, you would have to register Metasploit each time.
* Log in with user root,
4 min
Exploits
My First Week at Metasploit
Hi all. I would like to take a minute to share some of my feelings about my
first week here as a full-time Metasploit exploit developer, and share some
exploit modules.
First of all, I would like to thank everyone on the the Metasploit team for
being so nice to me from the first week, and for helping me with anything I
need. They are definitely going easy on me during my first days! Their support
allowed me to build two exploits for the team during my first week here:
* batic_svg_java exploit
4 min
Metasploit
Top 10 Most Searched Metasploit Exploit and Auxiliary Modules
At Rapid7, we often get asked what the top 10 Metasploit modules are. This is a
hard question to answer: What does "top" mean anyway? Is it a personal opinion,
or what is being used in the industry? Because many Metasploit users work in
highly sensitive environments, and because we respect our users' privacy, the
product doesn't report any usage reports back to us.
We may have found a way to answer your questions: We looked at our
metasploit.com web server stats, specifically the Metasploit A
2 min
Metasploit
Weekly Metasploit Update: CCTV, SCADA, and More!
This week's update highlights Metasploit modules for embedded operating systems
(as opposed to the usual client or server targets), so let's hop to it.
Security Camera Hackers
On Tuesday, guest blogger Justin Cacak of Gotham Digital Science talked about
his module, cctv_dvr_login
[http://metasploit.com/modules/auxiliary/scanner/misc/cctv_dvr_login]. The
latest update [http://www.rapid7.com/downloads/metasploit.jsp] for Metasploit
has it now, so if you happen to run into some of these devices
3 min
Metasploit
Hacking CCTV Security Video Surveillance Systems with Metasploit
From our guest blogger and Metasploit community contributor Justin Cacak at
Gotham Digital Science.
A new module for the Metasploit Framework, cctv_dvr_login
[http://metasploit.com/modules/auxiliary/scanner/misc/cctv_dvr_login], discovers
and tests the security of standalone CCTV (Closed Circuit Television) video
surveillance systems. Such systems are frequently deployed in retail stores,
living communities, personal residences, and business environments as part of
their physical security pro
2 min
Metasploit
Weekly Metasploit Update: Armitage, Psnuffle, and More!
This week's update features a great big pile of Java source code, a makeover for
a perennial favorite feature, and a handful of new exploits. Read on, or just
skip all the yadda yadda and download Metasploit
[http://www.rapid7.com/downloads/metasploit.jsp] here.
Armitage Source
This week's biggest change in terms of LOC (lines of code) is the inclusion of
the Armitage source code, in external/source/armitage. For a while now, we've
been distributing Raphael Mudge's Armitage front-end for the Me
3 min
Metasploit
Weekly Metasploit Update: Back to Work!
Hey, it's the first post-Metasploit 4.3.0 update, which means that I'm back in
the blogging business. Huzzah!
We've all been heads-down for a while getting this bad boy
[http://www.metasploit.com/download/] out the door, so while there's not a ton
of new functionality to talk about this week, we do have some neat new modules,
and one API change for module developers.
Wake On LAN
"The most secure computer is the one that's not turned on," is an old computer
security adage, speaking to the compl
4 min
Metasploit
Weekly Metasploit Update: SCADA, Lab Gem, and Squid Pivoting
This week's update [http://www.metasploit.com/download/] is packed full of
awesome, and I don't use that term lightly.
SCADA Attacks, DigtialBond, and Metasploit
This week sees the addition of six new SCADA modules, targeting a variety of PLC
devices, including two new modules aimed at the Schneider Quantum programmable
logic controller (PLC). In order to give penetration testers the ability to
accurately assess SCADA infrastructure, Tod Beardsley (from Rapid7) and K. Reid
Wightman (from Digit
3 min
Metasploit
Weekly Metasploit Update: DNS Payloads, Exploit-DB, and More
This week we've got a nifty new shellcode delivery scheme, we've normalized on
Exploit-DB serial numbers, and a pile of new modules, so if you don't have
Metasploit yet, you can snag it here [http://www.metasploit.com/download/].
DNS Payloads in TXT Records
To quote RFC 1464 [http://tools.ietf.org/html/rfc1464] describing DNS TXT
records, "it would be useful to take advantage of the widespread use and
scalability of the DNS to store information that has not been previously
defined." I don't kno
1 min
Metasploit
Identifying IPv6 Security Risks in IPv4 Networks: Tools
This post details some of the tools used in my recent IPv6 security testing
webcast [http://information.rapid7.com/WebcastOnDemand_IPv6.html] If you have
any specific questions, please open a Discussion
[https://community.rapid7.com/community/metasploit/content?filterID=content~objecttype~objecttype%5Bthread%5D]
thread.
A minimal IPv6 toolbox:
* A Linux-based operating system [http://www.ubuntu.com/] with IPv6 support
(BSD variants are great too)
* The IPv6 Attack Toolkit [http://www.thc
3 min
Metasploit
Weekly Metasploit Update: Spiceworks, AFP, RDP, and a New HTTP Downloader
After a couple of relatively light weeks (blame SXSW, I guess), this week's
update has quite a few neat new additions. As always, if you don't already have
Metasploit, what are you waiting for
[https://www.rapid7.com/products/metasploit/download/]? For the rest of us,
here's what's new.
Importapalooza
This week's update has support for importing asset lists exported from
Spiceworks, courtesy of Rapid7's Brandon Perry. Spiceworks is a free asset
management application used by tons of IT pros and
3 min
Metasploit
Weekly Metasploit Update: Session Smarts and GitHub
It's another Metasploit update, and it's headed straight for us!
Session Smarts
This week, Metasploit session management got a whole lot smarter. Here's the
scenario: As a penetration tester, you rook a bunch of people into clicking on
your browser-embedded Flash exploit [/2012/03/08/cve-2012-0754], sit back, and
watch the sessions rolling in. However, they're all behind a single NAT point,
so all your sessions appear to be terminating at a single IP address, and you
quickly lose track of who's