3 min
Metasploit
Metasploit Wrap-Up 3/8/19
The Payload UUID and paranoid mode Meterpreter payload and listener features were first introduced and added to many HTTP and TCP Metasploit payloads in mid-2015.
3 min
Customer Perspective
Seasoned Pros Share Career Advice for Cybersecurity Success
In this blog, seasoned pros share what they’ve learned over the course of their careers that would have made a significant impact if they were just setting off at the starting gate.
2 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 3/1/19
An improvement to HTTP command stagers allows exploits to write on-disk stagers to the location of your choosing.
2 min
Research
Cisco® RV110/RV130/RV215 Unauthenticated Configuration Export Vulnerability (CVE-2019-1663): What You Need to Know
This week, Cisco® released an advisory and patch for a remote code execution flaw in small-business routers used for wireless connectivity in small offices and home offices.
3 min
Automation and Orchestration
How Security Automation Enables Business Agility
How can any organization’s security team balance these priorities in a rapidly shifting security landscape while staying agile? Automation.
3 min
Vulnerability Management
Why Most Vulnerability Management Programs Fail and What You Can Do About It
In our latest webcast, we explain why most vulnerability management programs fail and what you can do to avoid the same fate.
4 min
Vulnerability Management
Checkmate! How to Win at Vulnerability Management Using the Game of Chess
Because the mindset you use to win at chess is the same one you should strive for as an information security professional, you can learn a lot by examining its rules, players, and strategy.
4 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/22/19
Document ALL THE THINGS!
This release sees quite a bit of documentation added with a module doc from
bcoles and four new module docs from newer docs contributor Yashvendra
. Module docs can be viewed with info -d and are
extremely helpful for getting acquainted with a modules capabilities and
limitations. We greatly value these contributions because, while not cool h4x0r
features by themselves, each one means that fewer people have to read the code
to understand ho
3 min
Vulnerability Management
Drupal Core Remote Code Execution (CVE-2019-6340): What You Need to Know
On Wednesday, Feb. 20, 2019, the Drupal Core team provided an early-warning update for the third Drupal Core Security Alert of 2019, which has been assigned CVE-2019-6340.
6 min
IoT
[IoT Security] Introduction to Embedded Hardware Hacking
Many security professionals and researchers are intrigued by the idea of opening up and exploring embedded technologies but aren’t sure where to start.
12 min
Exploits
Stack-Based Buffer Overflow Attacks: Explained and Examples
Stack-based buffer overflow exploits are likely the shiniest and most common form of exploit for remotely taking over the code execution of a process.
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/15/19
Crock-Pot cooking with Metasploit
Belkin's Wemo line of smart home
devices offers users a variety of internet-connected gadgets and gizmos they can
control around the home. One of those happens to be a Crock-Pot
. We went ahead and bought one.
Naturally, it made sense for us to write a module
9 min
Research
Level Up Your Internet Intelligence Using the Rapid7 Open Data API and R
Let's take a look at how you can use ropendata in R to search for available studies, download datasets, and explore the data.
2 min
Patch Tuesday
Patch Tuesday - February 2019
Microsoft got back in the swing of things today after a couple of relatively
light months, with over 70 separate CVEs
being addressed.
The usual suspects got patches, including Windows, Office, Browsers (including
Adobe Flash
),
.NET Framework, SharePoint, Exchange, and another slew of JET Database Engi
3 min
Metasploit Weekly Wrapup
Metasploit Wrap-Up 2/8/19
Ubiquitous Devices
Our Rapid7 Labs team pulled the thread
on some recent buzz around exploitable Ubiquiti devices, which led to a new
scanner module (
auxiliary/scanner/ubiquiti/ubiquiti_discover.rb) from jhart-r7
. This module uses a simple UDP protocol to
identify potentially exploitable Ubiquiti devices on your network, a