3 min
Incident Detection
Detection Reflection: Analyzing 9 Months of Rapid7 Penetration Testing Engagements
In this post, we’ll review results and trends from Under the Hoodie 2018 as they relate to incident detection, including where our red team found success.
2 min
Penetration Testing
Under the Hoodie 2018: Lessons from a Season of Penetration Testing
Today, I’m excited to announce the release of our 2018 edition of Under the Hoodie: Lessons from a Season of Penetration Testing by the Rapid7 Global Services team, along with me, Tod Beardsley and Kwan Lin.
3 min
Research
Password Tips from a Pen Tester: What is Your Company’s Default Password?
Welcome back to Password Tips From a Pen Tester. Last time, I exposed common
password patterns
[/2018/06/12/password-tips-from-a-pen-tester-common-patterns-exposed/] we see
when we perform penetration testing service engagements
[https://www.rapid7.com/services/penetration-testing-services/] for our clients
at Rapid7. This month, let’s dig into the amazingly weak default passwords that
so many companies use.
The first day on the job: We fill out all the requisite paperwork for Human
Resources a
5 min
Penetration Testing
How to Build Your Own Caller ID Spoofer: Part 2
In Part 1 [/2018/05/24/how-to-build-your-own-caller-id-spoofer-part-1/], we
talked about the need for organizations to test their security programs by
performing social-engineering campaigns with their employees so they can
understand employee susceptibility to these kinds of tactics, the potential
impact to the organization of this kind of attack, and develop methods of
defending against a real attack. We spoke about the need for accurately
simulating threat actors by setting up an Asterisk PBX
7 min
Penetration Testing
How to Create a Secure and Portable Kali Installation
The following is a guest post from Rapid7 customer Bo Weaver.
Hi, everyone. I’m Bo, a penetration tester at CompliancePoint (and also a
customer of Rapid7). If you’re just getting started in penetration testing
[https://www.rapid7.com/fundamentals/penetration-testing/], or are simply
interested in the basics, this blog is for you.
An Intro to Kali
Kali Linux is an open source project that is maintained and funded by Offensive
Security [https://www.offensive-security.com/], a provider of inform
3 min
Penetration Testing
Password Tips From a Pen Tester: Common Patterns Exposed
Welcome back to Password Tips From a Pen Tester. Last time, I talked about what
you can expect to learn from these posts and I also explained the three most
common passwords that we see on penetration tests
[/2018/05/10/password-tips-from-a-pen-tester-3-passwords-to-eliminate/]. This
month, let’s take a look at how that kind of information is helpful on a
penetration test [https://www.rapid7.com/fundamentals/penetration-testing/], and
correlate what we know to actual data collected.
When my co
6 min
Penetration Testing
How to Build Your Own Caller ID Spoofer: Part 1
Purpose
Organizations with mature security programs often test their own internal
awareness programs by performing social engineering campaigns (e.g., telephone
pretexting) on their personnel. These may include hiring third-party consulting
companies as well as performing internal tests. These tests should strive to be
as real-world as possible in order to accurately simulate a malicious actor and
learn from employees’ reactions and ascertain the level of risk they pose to the
organization. Spoo
4 min
Penetration Testing
Password Tips From a Pen Tester: 3 Passwords to Eliminate
Every week, Rapid7 conducts penetration testing services
[https://www.rapid7.com/services/penetration-testing-services/] for
organizations that cracks hundreds—and sometimes thousands—of passwords. Our
current password trove has more than 500,000 unique passwords that have been
collected over the past two years. Where do these come from? Some of them come
from Windows domain controllers and databases such as MySQL or Oracle; some of
them are caught on the wire using Responder
[https://github.com
4 min
InsightIDR
Attacker Behavior Analytics: How InsightIDR Detects Unknown Threats
InsightIDR customers now have an ever-evolving library of attacker behavior detections automatically matched against their data. Read on to learn how Rapid7 SOC and threat intel teams investigate a constant rumbling of attacker behavior and transform it into actionable threat intelligence.
3 min
Haxmas
Hohoho-wned: First Steps Toward a Pen Test Oriented Rootkit
Year after year it seems that Santa is intent on sending me coal, but little
does he know that this year I already have access to one of his Linux machines
and I'm going to make sure that I at least deserve to get my fair share of black
rocks. I decided to dig into the world of Linux rootkits and long-term footholds
with evasion techniques; this is an area where lots of previous research has
been done, but in traditional bootstrapper fashion I decided to start writing a
backdoor from scratch wit
4 min
Penetration Testing
Metasploit MinRID Option
We’ve added a new option to the smb_lookupsid Metasploit module
[https://www.rapid7.com/db/modules/auxiliary/scanner/smb/smb_lookupsid]. You can
now specify your starting RID.
Wait, What Does This Module Do Again?
As a penetration tester, one of the first things I try to do on an internal
network is enumerate all of the domain users so that I can perform login attacks
against them. It would be a noteworthy risk if we could do that anonymously,
because that means that any malicious actor who can
2 min
UNITED
Keeping it simple at UNITED
The following post is a guest blog by Bo Weaver, Senior Penetration Tester at
CompliancePoint [http://www.compliancepoint.com/]. If you're attending UNITED,
you can catch Bo's talk at 11:45 AM on Thursday, September 14 in the Phish, Pwn,
and Pivot track.
Hi! I’m Bo. I’ll be speaking at Rapid7’s UNITED Summit in Boston
[https://unitedsummit.org/index.php] this week, and Rapid7's community manager
[/author/caitlin-condon] asked me to write a little blog about my talk. I marvel
how on the net we
4 min
Penetration Testing
IoT Security Testing Methodology
By
Deral Heiland IoT - IoT Research Lead Rapid7
Nathan Sevier - Senior Consultant Rapid7
Chris Littlebury - Threat Assessment Manage Rapid7
End-to-end ecosystem methodology
When examining IoT technology, the actionable testing focus and methodology is
often applied solely to the embedded device. This is short sighted and
incomplete. An effective assessment methodology should consider the entire IoT
solution or as we refer to it, the IoT Product Ecosystem. Every interactive
component that makes
3 min
Metasploit
Exploiting Macros via Email with Metasploit Pro Social Engineering
Currently, phishing is seen as one of the largest infiltration points for
businesses around the globe, but there is more to social engineering than just
phishing. Attackers may use email and USB keys to deliver malicious files to
users in the hopes of gaining access to an organization's network. Users that
are likely unaware that unsolicited files, such as a Microsoft Word document
with a macro, may be malicious and can be a major risk to an organization.
Metasploit Pro [https://rapid7.com/prod
4 min
Penetration Testing
Combining Responder and PsExec for Internal Penetration Tests
By Emilie St-Pierre, TJ Byrom, and Eric Sun
Ask any pen tester what their top five penetration testing tools
[https://rapid7.com/fundamentals/penetration-testing-tools/] are for internal
engagements, and you will likely get a reply containing nmap, Metasploit,
CrackMapExec, SMBRelay and Responder.
An essential tool for any whitehat, Responder is a Python script that listens
for Link-Local Multicast Name Resolution (LLMNR), Netbios Name Service (NBT-NS)
and Multicast Domain Name System (mDNS)