1 min
IT Ops
Feature requests
There are so many thing we can do with logs. We have a pile of new ideas on how
to make Logentries better and we spend time implementing these every single day.
We also collect feature requests from you, our lovely users. But we want to do
more – we want to include you to the whole process of future development.
We are happy to announce our Feature requests page, a page that enables you to
add new feature requests, vote on them, and add comments with more details.
Access the page from the sideb
6 min
Metasploit
Abusing Windows Remote Management (WinRM) with Metasploit
Late one night at Derbycon , Mubix
and I were discussing various techniques of mass
ownage. When Mubix told me about the WinRM service, I wondered: "Why don't we
have any Metasploit modules for this yet?" After I got back , I began digging.
WinRM/WinRS
WinRM is a remote management service for Windows that is installed but not
enabled by default in Windows XP and higher versions, but you can install it on
older operating systems as well. Win
1 min
Career Development
2012: Rapid7 Is a Boston Globe Top Place to Work...Again
I'm very happy to announce that Rapid7 has placed #13 on the Boston Globe's Top
Places to Work 2012. It's our second consecutive year on the Globe's list, and
thanks to our phenomenal growth, this year we hopped over from the small
business category to the mid-sized category. We've expanded our numbers 50%
already this year and just reported our 14th consecutive record quarter of
revenue growth.
Our inclusion in the Top Places to Work list highlights how important our
culture is to us, even a
3 min
Metasploit
Weekly Metasploit Update: WinRM Part One, Exploiting Metasploit, and More!
WinRM Exploit Library
For the last couple weeks, Metasploit core contributor David @TheLightCosine
Maloney has been diving into Microsoft's
WinRM services with @mubix and @_sinn3r
. Until these guys started talking about it, I'd
never heard WinRM. If you're also not in the Windows support world day-to-day,
you can read up on it at Microsoft
2 min
Metasploit
Weekly Metasploit Update: Microsoft Windows and SQL, TurboFTP, and More!
AppSecUSA 2012
Last week was AppSecUSA 2012 here in Austin, which may explain the curious
absence of a weekly Metasploit Update blog post. The hilights of Appsec for me,
were (in no particular order): Meeting Raphael @ArmitageHacker
Mudge in person for the first time, meeting
Scott @_nullbind Sutherland, author of a bunch of
recent Microsoft SQL post modules, and both of whom happened to contribute to
last week's Metasploit upda
3 min
Metasploit
Weekly Metasploit Update: Reasonable Disclosure, PHP EXE Wrappers, and More!
ZENWorks' Accidental Backdoor
This week, we saw the release of Metasploit exploit developer Juan Vazquez's
freshly discovered vulnerability in Novell ZENWorks. You can read all about it
in Juan's great technical blog post, but the short version for the
attention-deprived is: Novell ZENWorks ships with hard-coded credentials, which
allow for SYSTEM-level file system read access.
That seems like kind of a big deal for ZENWorks users -- namely because there's
no reasonable way to change these cred
3 min
Ghost - an introduction
Rapid7 has announced today that the Ghost USB honeypot
will be one of the projects
sponsored in their Magnificent7 program. In this blog post, I'm going to give an
overview of what Ghost is all about, and I'll motivate our plans for the next
year.
Our goal is to protect you from the threats of using USB devices. Despite being
indisputably useful, USB devices in general and storage devices in particular
bear a great risk: Malware can use them as a t
7 min
Exploits
New 0day Exploit: Novell ZENworks CVE-2012-4933 Vulnerability
Today, we present to you a flashy new vulnerability with a color-matching
exploit straight from our super secret R&D safe house here in Metasploit
Country. Known as CVE-2012-4933
, it applies to
Novell ZENworks Asset Management 7.5, which "integrates asset inventory,
software usage, software management and contract management to provide the most
complete software asset management tool available". Following our standard
disclosure polic
3 min
Metasploit
Weekly Metasploit Update: RopDB, Local Exploits, Better Samples, and More
Introducing RopDB
This week, Metasploit exploit devs Wei "sinn3r" Chen and Juan Vazquez finished
up Metasploit RopDB. This advancement allows for drop-in ROP chains in new
exploits, without all that mucking around with copying and pasting mysterious
binary blobs from one exploit to the next. For the details on how to use it and
what to expect in the API, see sinn3r's most excellent blog post. What all this
does is bottle up ROP wisdom in a central repository, so chains can be added and
modified
2 min
IT Ops
Cooking up Engine Yard logs with Chef
Opscode’s Chef is an open-source automation framework for the cloud, involving
‘recipes’ that can be triggered by events such as servers booting or restarting.
Chef scripts are written in Ruby, but will often use OS-specific system calls to
manipulate server instances. Chef is a great way to automate your cloud, and in
particular it’s useful as your environment grows! On Engine Yard, Chef recipes
can also be used to configure add-ons (like Logentries) on your servers, as we
will explain…
Each s
2 min
Nexpose
Multi-tenant User Provisioning
Introduction
Performing bulk operations can be time consuming in Nexpose. A good example is
user provisioning, which can take a long time. To save time, using the Nexpose
APIs is an effective way to save you time and eliminate the error-prone process
of doing everything manually. For this blog post, I want to demonstrate how you
can manage users using the Nexpose API. I will be using an open source Java API
client, which is available on clee-r7/nexpose_java_api · GitHub
3 min
Metasploit
Weekly Metasploit Update: Stealing Print Jobs, Exploiting Samba, and More
This update has something for everyone -- new exploits, new auxiliary modules,
new post modules, and even new payloads. If quadfecta is a word, we totally hit
it this week!
More Mac OSX 64-Bit Payloads
The parade of OSX 64-bit payloads continues, with five new 64-bit payloads added
this week:
* modules/payloads/singles/osx/x64/say.rb
* modules/payloads/singles/osx/x64/shell_find_tag.rb
* modules/payloads/stagers/osx/x64/bind_tcp.rb
* modules/payloads/stagers/osx/x64/reverse_tcp.rb
* modul
4 min
Defeat the Hard and Strong with the Soft and Gentle Metasploit RopDB
Data Execution Prevention (DEP) has
always been a hot topic in modern software exploitation. This is a security
feature implemented in most popular operating systems, designed to prevent a
program from executing in a non-executable memory location. So when a malicious
code tries to inject payload in memory, it should fail during execution, and
then simply crashes. But here's the thing, although DEP plays an important role
to your computer's countermeas
1 min
Nexpose
Moving from HML (High, Medium, Low) Hell to Security Heaven – Whiteboard Wednesdays
At last check there are about 22 new vulnerabilities being published and
categorized every single day (see National Vulnerability Database web site -
http://nvd.nist.gov/). In total, the National Vulnerability Database now
contains more than 53,000 vulnerabilities. No wonder security professionals are
overwhelmed with the sheer volume of vulnerabilities in their daily practices.
At the same time, the prioritization schema that many organizations use are
quite basic and are either proprietary or
2 min
API
How to generate reports through the API
Nexpose provides a number of api methods for report management. Through the API
you can create/update a report configuration, generate a report on the fly, and
view the status of the generation requests.
A report configuration, in particular, is a configuration for a type of report.
With a configuration, a user can specify the template, format, and content for a
report. In order to create a configuration via the API a user must generate a
ReportSaveRequest.
ReportSaveRequest - The report save