Posts tagged Metasploit Weekly Wrapup

1 min Metasploit

Metasploit Wrapup 7/6/18

New Modules Exploit modules (3 new) * Nagios XI Chained Remote Code Execution [https://www.rapid7.com/db/modules/exploit/linux/http/nagios_xi_chained_rce_2_electric_boogaloo] by Benny Husted [https://github.com/BennyHusted], Cale Smith [https://github.com/caleBot], and Jared Arave [https://www.exploit-db.com/author/?a=9106], which exploits CVE-2018-8736. Monitor this series of unfortunate events all the way to magical shells. * Boxoft WAV to MP3 Converter v1.1 Buffer Overflow

2 min Metasploit Weekly Wrapup

Metasploit Wrapup: 6/29/18

Moar Power OJ Reeves [https://github.com/OJ] added [https://github.com/rapid7/metasploit-framework/pull/10206] two new PowerShell transport functions to Metasploit payloads and made modifications to the PowerShell transport binding functionality. The aptly-named Add-TcpTransport function adds an active TCP transport to the current session and the Add-WebTransport function adds an HTTP/S transport to the current session. These functions are fully documented, allowing the user to leverage the Ge

2 min Metasploit Weekly Wrapup

Metasploit Wrapup: 6/22/18

Welcome to another installment of the week! This installment features a new ETERNALBLUE module in everyone's favorite reptile-brain language, Python! Sporting support for Windows 8 and 10, it has everything you need, including immutable strings and enforced whitespace. In other Windows 10 news, chervalierly [https://github.com/chervaliery] fixed an annoying bug in rex-powershell that prevented PsExec from working on later versions of Windows 10. Now, you can PsExec to your heart’s content. Go f

2 min Metasploit Weekly Wrapup

Metasploit Wrapup: 6/15/18

New Privilege Escalation Exploit The glibc 'realpath()' module [https://github.com/rapid7/metasploit-framework/pull/10101] was added by bcoles [https://github.com/bcoles]. It attempts to gain root privileges on Debian-based Linux systems by exploiting a vulnerability in GNU C Library (glibc) version <= 2.26. This exploit uses halfdog's [https://github.com/halfdog] RationalLove exploit to expose a buffer underflow error in glibc realpath() and create a SUID root shell. The module includes offset

2 min Metasploit Weekly Wrapup

Metasploit Wrapup 6/8/18

Just Let Me Grab My Popcorn First This week, rmdavy [https://github.com/rmdavy] contributed a pair of modules designed to fool Windows into authenticating to you so you can capture sweet, sweet NetNTLM hashes. BadODT [https://github.com/rapid7/metasploit-framework/pull/10067] targets LibreOffice/Apache OpenOffice by providing a link to an image on a network share, and the new Multi Dropper [https://github.com/rapid7/metasploit-framework/pull/10115] creates all sorts of files Windows itself lov

2 min Metasploit Weekly Wrapup

Metasploit Wrapup 6/1/18

Upgrade Your SOCKS Thanks to zeroSteiner [https://github.com/zeroSteiner], we have some very nice additions to the SOCKS5 library this week. His changes enabled BIND connections through the SOCKS5 proxy [https://github.com/rapid7/metasploit-framework/pull/9990], improved automated testing around the code, and broke it up into more manageable, targeted submodules. Now that Trevor’s dying wish [https://twitter.com/Bandrel/status/912312568055771137] has been fulfilled, the team can finally leave

3 min Metasploit Weekly Wrapup

Metasploit Wrapup 5/25/18

Bonjour! Que désirez-vous? We want to know what you'd like to see out of our latest Metasploit improvements. Please take a moment to fill out our community survey to help shape Metasploit's new backend data service. Tell us how you use the Metasploit database, which Metasploit data you use with other tools, how you need to store data from modules you've written, and so on. Please take our survey! [https://docs.google.com/forms/d/e/1FAIpQLSckVYKP9qVg_VSQcYPoFaYperYFBfmjfZXwi6jIxDokdext6Q/viewfor

3 min Metasploit Weekly Wrapup

Metasploit Wrapup 5/18/18

You Compile Me Our very own wchen-r7 [https://github.com/wchen-r7] added the ability to compile C code in metasploit, including (select) dependencies by creating a wrapper for metasm. Right now, support for windows.h is the first salvo in custom compiling tools within the metasploit interface! Hack all the things! For a long time, people have asked us to support RHOSTS in exploits just like we do in AUX modules. We listened, and now framework exploits support RHOSTS! Set your exploit, your

2 min Metasploit Weekly Wrapup

Metasploit Wrapup: 5/11/18

Chaining Vulnerabilities Philip Pettersson discovered vulnerabilities in certain PAN OS versions [http://seclists.org/fulldisclosure/2017/Dec/38] that could lead to remote code execution and hdm wrote a Metasploit module for the exploit chain [https://github.com/rapid7/metasploit-framework/pull/9980]. The exploit chain starts off with an authentication bypass, which allows the module to access a page that is vulnerable to an XML injection. This page is then used to create a directory where a pay

3 min Metasploit Weekly Wrapup

Metasploit Wrapup 5/4/18

May the fourth be with you… Get comfortable, put on your headphones or turn up your speaker volume, and enjoy this guitar rendition [https://www.youtube.com/watch?v=CBZgLM5HUzU] of the Ewok Celebration, commonly known as Yub Nub [https://starwars.fandom.com/wiki/Ewok_Celebration] while catching up on Metasploit updates for the week. PHP Debugging Xdebug [https://xdebug.org/] is an extension for PHP to facilitate development by providing interactive debugging capabilities and much more. On an

3 min Metasploit Weekly Wrapup

Metasploit Wrapup 4/27/18

After last week's seriously serious write-up [https://www.rapid7.com/blog/post/2018/04/20/metasploit-wrapup-36/], this week we will return to our norml normal, lighthearted (and Metasploit-hearted) wrap-ups, though we remain fans of terrible 80s movies. Drupalgeddon 2: Webdev Boogaloo After last month's Drupal exploit came to light, nearly a dozen developers have been hard at work to add a module targeting CVE-2018-7600 [https://www.rapid7.com/db/vulnerabilities/drupal-cve-2018-7600]. You can

2 min Metasploit Weekly Wrapup

Metasploit Wrapup 4/20/18

You may have noticed that our weekly wrapups [https://www.rapid7.com/blog/tag/metasploit-weekly-wrapup/] tend to be very light-hearted. A few might say our blog is humourous. Some might even argue that they incorporate low-brow internet jokes and an excessive quantity of memes. Well, I'm here to say we've turned over a new leaf. No longer will cheap comedy cover the pages of this professional publication. In honor of April 20th, this blog post will remain serious. Seriously. Google Summer of

2 min Metasploit Weekly Wrapup

Metasploit Wrapup 4/13/18

What's Your Favorite Security Site? When you are browsing sites on the Internet, you may notice some sites [http://www.irongeek.com/] will include your public IP address on their pages. But what if you came across a site that also showed your IP address from your private network range [https://media.giphy.com/media/3otPoDVeyxTT1jIKqc/giphy.gif]? This might be a little worrying [https://media.giphy.com/media/xhaHU2l56OSYM/giphy.gif], but before you run off you check to make sure the coast is cle

2 min Metasploit Weekly Wrapup

Metasploit Wrapup 4/7/18

Mobile Moose This week marked the beginning of our time in the new office. Everything got packed up and moved: computers, chairs, Rudy’s cups, and odd soy sauce packets in the back of the drawers. One consequence of moving to downtown Austin is that the lunch debates take longer, with flame wars about both the best tacos and the best barbecue. Metasploit: Now With More Snakes! @shellfail [https://twitter.com/shellfail] doubled down this wrapup; way back in March, he wrote a guide to writing P

4 min Metasploit Weekly Wrapup

Metasploit Wrapup 4/2/18

Spring has come again to Austin, TX, home of the Rapid7 Metasploit team. While the season here brings pollen and allergies, it also brings fields full of bluebonnets and folks taking pictures before they all disappear. Let's celebrate by looking at what's popped up in Metasploit this week. New Data Model Last week, we landed the beginning of a new backend service for Metasploit, dubbed 'Goliath', which creates a new abstraction between Metasploit Framework and how it interacts with the databa