Where in the world are my shells?
A couple weeks back, we published a post module from Tom Sellers which helps out tremendously with geolocating a target computer based on which wireless networks are nearby. Seriously, this module is the bee's knees, and can really help illustrate risk to an organization -- I can imagine scenarios where an attacker has a persistent shell on a company executives laptop, and can simply use this module (or something like it) to check in on where he spends his time, which is sure to creep said executives out.
Now, Tom has a delightful demo showing exactly how one would go about using it -- click below to see his video, which incidentally is the first video added to the soon-to-be-glorious Metasploit Framework Screencasts Youtube channel.
Don't get me wrong, Mubix's Metasploit Minute webcasts are great and recommended for new users to Metasploit, as are many, many of the over 65,000 videos claiming to have something to do with Metasploit. The focus of the Metasploit screencasts channel is, well, simple screencasts of with Metasploit Framework that can help lllustrate the usage for both old and popular modules as well as some new hotness that may need a little extra explanation. They may also explore some alternate usages of modules that have lots of options, For example, many auxiliary modules have an ACTION list that can change how or why you would use a module, depending on circumstances. Actually demoing in screencast format can help illustrate quickly what those scenarios might be.
So, feel free to bug Tom about dropping some voice over audio -- ideally in the baritone tones of a Morgan Freeman mixing board -- to explain what's going on. Or, alternatively, experience this super fun module in all its zaniness with the venerable Benny Hillifier (warning, clicking this link may irritate your co-workers fairly instantly).
We have five new modules for this week's update -- the three from Rapid7's Deral Heiland which explore default SNMP configurations on popular home and small business routers, which we disclosed late last week, and an exploit against Symantec's enterprise workstation management system, Symantec Workspace Streaming and a SQL injection module against Advantech's product, both by the one and only Juan Vazquez.
- Symantec Workspace Streaming Arbitrary File Upload by juan vazquez and rgod exploits ZDI-14-127
Auxiliary and post modules
- Advantech WebAccess SQL Injection by juan vazquez and rgod exploits ZDI-14-077
- Brocade Password Hash Enumeration by Deral "PercentX" Heiland
- Netopia 3347 Cable Modem Wifi Enumeration by Deral "PercentX" Heiland
- Ubee DDW3611b Cable Modem Wifi Enumeration by Deral "PercentX" Heiland
If you're new to Metasploit, you can get started by downloading Metasploit for Linux or Windows, either the totally free Metasploit Community Edition, or the 14-day free trial of Metasploit Pro. If you're the sort to track bleeding-edge development code, then these modules are but an msfupdate command away. For readers who are already using Metasploit Community or Metasploit Pro, you'll be able to install the new hotness today via the Administration : Software Updates button.