All Posts

3 min

Why I joined Rapid7

I'll start by admitting that this blog post is a little overdue. I started at Rapid7 on December 1st of last year and I have literally hit the ground running. That's no excuse for being late but a good indicator that I have landed in the right place. I'm not the kind of person that changes jobs on a whim (no pun intended) so I'm happy to go in a bit more detail on why I joined Rapid7 and why I'm so excited about this. I've been in this business for almost 18 years now and enjoyed doing security

3 min IT Ops

Installing Logentries Using Ansible

*This post was written by Logentries customer Richard van den Brand, Software Engineer at Waarneembemiddeling.nl, where he is responsible for developing and maintaining their Symfony2 applications and infrastructure. * In this short tutorial I’ll describe the steps required to install the Logentries agent using Ansible. This tutorial assumes you have some basic knowledge about Ansible and how to use playbooks and roles. If you’re unfamiliar with these topics please co

2 min Patch Tuesday

Patch Tuesday, February 2015

For the second straight month Microsoft is holding fast to their blockade of information.  Customers with “Premier” support are getting a very sparse advance notification 24 hours before the advisories drop, and “myBulletins” continues to be useless because it is not updated until well after the patch Tuesday release.  Microsoft called this an evolution, and I can certainly see why – they are applying a squeeze to security teams that will eliminate the weak members of the herd. This month we ar

2 min Android

R7-2015-02: Google Play Store X-Frame-Options (XFO) Gaps Enable Android Remote Code Execution (RCE)

Vulnerability Summary Due to a lack of complete coverage for X-Frame-Options (XFO) support on Google's Play Store web application domain, a malicious user can leverage either a Cross-Site Scripting (XSS) vulnerability in a particular area of the Google Play Store web application, or a Universal XSS (UXSS) targeting affected browsers, to remotely install and launch the main intent of an arbitrary Play S

4 min Metasploit

Being Product Manager of Metasploit

Hello World My name is Eray Yilmaz, and I am the new Product Manager of Metasploit. It has been three months since I have joined Rapid7, and I wanted to share my experiences with you so far. Before we get to that, here is tiny bit about myself: I am a 28, married, and fairly new father. I went to UTSA where I majored in Information Assurance and Information Systems, and received my B.B.A. Like anyone else in our industry, I have done my fair share of IT work, from helpdesk to managing networks

4 min Nexpose

GHOSTbuster: How to scan just for CVE-2015-0235 and keep your historical site data

A recently discovered severe vulnerability, nicknamed GHOST, can result in remote code execution exploits on vulnerable systems. Affected systems should be patched and rebooted immediately. Learn more about CVE-2015-0235 and its risks . The Nexpose 5.12.0 content update provides coverage for the GHOST vulnerability. Once the Nexpose 5.12.0 content update

3 min IT Ops

The Role of Logging in ChatOps

What is ChatOps you might ask? Well, if you are like me, you and your team may be already be doing it and you don’t even know it. On a recent visit to San Francisco I was telling one of our tech partners about our new Slack integration when he responded by saying, “Slack and Logentries, cool! Yep everyone is doing ChatOps these days…”

2 min Linux

GHOST in the Machine - Is CVE-2015-0235 another Heartbleed?

CVE-2015-0235 is a remote code execution vulnerability affecting Linux systems using older versions of the GNU C Library (glibc versions less than 2.18). The bug was discovered by researchers at Qualys and named GHOST in reference to the _gethostbyname function (and possibly because it makes for some nice puns). To be clear, this is NOT the end of the Internet as we know, nor is it further evidence (after Stormaggedon) that the end of the world is nigh. It's also not another Heartbleed. But it

3 min IT Ops

Infographic: Top 4 Log Management Challenges

At Logentries we chat to new users everyday who are looking for an improved solution for centralizing and analyzing their log data. They have often tried rolling their own solution, have previously gone the open source route, or are using an “old school” logging technology. But, what we find across new users, regardless of how they are managing their log data, are some common challenges that have historically made log management

4 min

The Internet of Gas Station Tank Gauges

Introduction Automated tank gauges (ATGs) are used to monitor fuel tank inventory levels, track deliveries, raise alarms that indicate problems with the tank or gauge (such as a fuel spill), and to perform leak tests in accordance with environmental regulatory compliance. ATGs are used by nearly every fueling station in the United States and tens of thousands of systems internationally. Many ATGs can be programmed and monitored through a built-in serial port, a plug-in serial port, a fax/modem,

4 min IT Ops

Unit testing with Karma and Jasmine for AngularJS

So you’ve started to build applications with AngularJS; or, maybe you’ve done unit testing before but haven’t used it with AngularJS; or, maybe it’s all new to you, but either way this article should help to orient you to the value of using Karma with Jasmine and offer some tips on displaying functionalities of Angular JS. Let’s get started! My app is small it doesn’t need any tests, right? Wrong! A small app can have errors and it’s bad practic

2 min Microsoft

Patch Tuesday, January 2015 - Dawn of a new era

Microsoft's January 2015 patch Tuesday marks the start of a new era.  It seems that Microsoft's trend towards openness in security has reversed and the company that was formerly doing so much right, is taking a less open stance with patch information.  It is extremely hard to see how this benefits anyone, other than, maybe who is responsible for support revenue targets for Microsoft. What this means is that the world at large is getting their first look at understandable information about this

4 min IT Ops

Dynamite Plots, Logs, & the Joy In Knowing

I saw this online and chuckled. I believe it was Mark Twain that said, “Humor is the good natured side of truth.” Well, in my humble opinion, humor can be used as the genesis for interesting blog posts. So, you may be wondering, what do Dynamite Plots, logs and the joy of knowledge have to do with each other? Well, if you have a few minutes, I’ll try to make the link. For me, the humor of the cartoon above is rooted in multiple areas, but most of all in the idea that the data inherently has

6 min

Google No Longer Provides Patches for WebView Jelly Bean and Prior

Over the past year, independent researcher Rafay Baloch (of "Rafay's Hacking Articles") and Rapid7's Joe Vennix have been knocking out Android WebView exploits somewhat routinely, based both on published research and original findings. Today, Metasploit ships with 11 such exploits, thanks to Rafay, Joe, and the rest of the open source security community. Generally speaking, these exploits affect "only" Android 4.3 and prior -- ei

4 min Metasploit

HOTFIX: Metasploit Startup Issues After Upgrading to 4.11.0 (Update 2014122301)

Overview The Update (2014122301) which was released on December, 23th 2014, failed to include necessary files for the application to update to version 4.11.0 for the first time. Issue The application will not start, therefore browser will provide generic "The page can't be displayed" message when trying to load the web UI. Additionally, various log messages may appear in respective log files. Windows: C:\metasploit\apps\pro\engine\prosvc.log Linux: /opt/metasploit/apps/pro/engine/prosvc_stder