Posts by Erin Bleiweiss

4 min Metasploit

Metasploit Weekly Wrap-Up: 5/13/22

Spring4Shell module Community contributor vleminator [] added a new module [] which exploits CVE-2022-22965 []—more commonly known as "Spring4Shell." Depending on its deployment configuration [] , Java Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19

3 min Metasploit

Metasploit Weekly Wrap-Up: 2/18/22

Nagios XI web shell upload module New this week is a Nagios Web Shell Upload module [] from Rapid7' own Jake Baines [], which exploits CVE-2021-37343 []. This module builds upon the existing Nagios XI scanner [] written

3 min Metasploit

Metasploit Wrap-Up: 11/19/21

Azure Active Directory login scanner module Community contributor k0pak4 [] added a new login scanner module for Azure Active Directory []. This module exploits a vulnerable [] authentication endpoint in order to enumerate usernames without generating log events. The error code returned by the endpoint can be used to discover the validity of user

3 min Metasploit Weekly Wrapup

Metasploit Wrap-Up: 8/13/21

Three new modules that deliver RCE on Atlassian Crowd and privilege escalation to SYSTEM via print drivers. Plus, a new command shell session type for SSH clients and plenty more enhancements and fixes.

3 min Metasploit

Metasploit Wrap-Up: 5/7/21

New modules that include Active Directory, Chrome, and Micro Focus targets. And we also reached-and-passed our 15,000th PR!!

2 min Metasploit

Metasploit Wrap-Up: 8/21/20

Setting module options just got easier! Rapid7's own Dean Welch [] added a new option [] to framework called RHOST_HTTP_URL, which allows users to set values for multiple URL components, such as RHOSTS, RPORT, and SSL, by specifying a single option value. For example, instead of typing set RHOSTS, set RPORT 5678, set SSL true, you can now accomplish the same thing with the command set RHOST_HTTP_URL

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up: 3/27/20

Three new modules, including a post module to automate the installation of an embeddable Python interpreter on a target, and a new exploit for Microsoft SharePoint Workflows.

2 min Metasploit

Metasploit Wrap-Up 10/11/19

Exploiting Windows tools There are two new Windows modules this week, both brought to you by the Metasploit team. The Windows Silent Process Exit Persistence module [], from our own bwatters-r7 [], exploits a Windows tool that allows for debugging a specified process on exit. With escalated privileges, an attacker can configure the debug process and then use the module to upload a payload which will launch e

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 7/12/19

We hope our American friends had a wonderful Fourth of July weekend! There are no new modules this week, so instead we're featuring two enhancements that fix some long outstanding Framework bugs. Check out last week’s holiday wrap-up for a list of the modules that landed while the U.S. was watching fireworks. GatherProof (or don't) Using ssh_login* on certain non-standard devices such as Brocade switches [] and Juniper firewalls [https:

2 min Metasploit

Metasploit Wrap-Up 4/5/19

Your workflow just got easier Are you tired of copy/pasting module names from the search results before you can use them? Thanks to this enhancement (PR #11652) [] by Brent Cook [], you can now run search with the -u flag to automatically use a module if there is only one result. Now you're one step closer to popping a shell! A pair of new JSO modules Metasploit published research a few weeks ago on Java Serializ

2 min Metasploit Weekly Wrapup

Metasploit Wrap-Up 1/4/19

Happy New Year to the Metasploit community! As we kick off 2019, we're excited to see all the modules, enhancements, and discussions the new year will bring. Ring In 2019 With SSL There is a new datastore option [] courtesy of wvu [] called CMDSTAGER::SSL. This exposes the ability to enable SSL/TLS command stagers with set cmdstager::ssl true. Auld Erlang Syne Good news if you're a fan of the multi/misc/erlang_co

2 min Metasploit Weekly Wrapup

Metasploit Wrapup: 9/28/18

Trevor Forget: Metasploit Town Hall @ Derbycon Metasploit’s Brent Cook [/author/brent-cook], Adam Cammack [/author/adam-cammack], Aaron Soto [/author/aaron], and Cody Pierce are offering themselves up to the crowds at this year’s fourth annual Metasploit Town Hall at Derbycon []. Heading to bourbon country next weekend? Block off your 5 PM hour on Saturday, October 6 to join the team as they unveil some new hotness in Metasploit Framework and take questions and requests