Metasploit Wrap-Up 05/02/2025 | Rapid7 Blog
Metasploit weekly wrap-up: A vulnerability fix with our thanks to longtime contributor bcoles (CVE-2025-3095), plus WonderCMS RCE and an updated LDAP password disclosure module www.rapid7.com/blog/post/20...
02.05.2025 19:56 β π 0 π 0 π¬ 0 π 0
Metasploit Wrap-Up 04/25/2025 | Rapid7 Blog
New in #Metasploit this week c/o @n00tmeg.bsky.social: A new msfconsole command to manage PKCS12 certificates stored in the database. Plus, automatic PKCS12-based Kerberos (and Schannel) authentication through PKINIT when no Kerberos ticket is cached. www.rapid7.com/blog/post/20...
28.04.2025 01:02 β π 0 π 1 π¬ 0 π 0
chutton-r7's assessment of CVE-2024-6235 | AttackerKB
On July 9, 2024, Citrix disclosed CVE-2024-6235, a sensitive information disclosure vulnerability affecting NetScaler Console. While βinformation disclosureβ sβ¦
Some neat n-day vulnerability analysis of Citrix NetScaler Console CVE-2024-6235 via Calum Hutton β the vuln allows an unauthenticated attacker to obtain an admin-level session ID from an internal API and use this to create other admin users on the system. attackerkb.com/assessments/...
22.04.2025 21:20 β π 2 π 3 π¬ 0 π 0
Metasploit Weekly Wrap-Up 04/11/2025 | Rapid7 Blog
New in #Metasploit this week: An auxiliary auth bypass module for CrushFTP, Oracle Access Manager RCE (CVE-2021-35587), support for the LDAP protocol within RHOSTS, and more #exploits for pgAdmin, Pandora FMS, and Appsmith.
www.rapid7.com/blog/post/20...
11.04.2025 22:27 β π 1 π 0 π¬ 0 π 0
CVE-2025-22457 | AttackerKB
On April 3, 2025, Ivanti published an advisory for CVE-2025-22457, an unauthenticated remote code execution vulnerability due to a stack based buffer overflow.β¦
We have just published our AttackerKB @rapid7.com Analysis of CVE-2025-22457, an unauthenticated stack based buffer overflow in Ivanti Connect Secure. Difficult to exploit due to severe character restrictions, we detail our full RCE technique here: attackerkb.com/topics/0ybGQ...
10.04.2025 18:19 β π 3 π 4 π¬ 1 π 0
Metasploit Wrap-Up 03/21/2025 | Rapid7 Blog
This week's #Metasploit release includes a new module for SMB-to-LDAP relaying β a long-in-the-works addition from @n00tmeg.bsky.social and @zerosteiner.bsky.social π₯See the weekly wrap-up for details!
www.rapid7.com/blog/post/20...
21.03.2025 19:59 β π 3 π 2 π¬ 0 π 0
Metasploit Wrap-Up 03/06/2025 | Rapid7 Blog
This week's Metasploit Wrap Up saw 3 new modules. Learn more about the enhancements, features, and bugs fixed.
We're bad at posting updates regularly, but the March 6 #Metasploit release has some gems, including a SonicWall HTTP login scanner, an aux module to retrieve NAA creds from SCCM servers, and better applicability checks for relay modules www.rapid7.com/blog/post/20...
17.03.2025 18:37 β π 2 π 0 π¬ 0 π 0
Metasploit Weekly Wrap-Up 02/21/2025 | Rapid7 Blog
New in #Metasploit this week: RCE exploits for InvokeAI and BeyondTrust + PostgreSQL, OSVDB search functionality in msfconsole, and new support for PPC, MIPS, and ARM architectures in Metasploit's fetch payloads to allow for better targeting of embedded systems π www.rapid7.com/blog/post/20...
21.02.2025 22:09 β π 1 π 0 π¬ 0 π 1
Metasploit Weekly Wrap-Up 02/14/2025 | Rapid7 Blog
In this week's #Metasploit release: 2 new exploit modules targeting mySCADA myPRO Manager and NetAlertX, plus a community enhancement to allow users with established shell sessions to deconflict built-in MSF commands and native commands on the target host. www.rapid7.com/blog/post/20...
15.02.2025 01:13 β π 0 π 0 π¬ 0 π 0
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
New Rapid7 vuln disclosure c/o @stephenfewer.bsky.social: CVE-2025-1094 is a SQL injection flaw in PostgreSQL's psql interactive tool that was discovered while analyzing BeyondTrust RS CVE-2024-12356. The bug is interesting β π§΅on its relation to BeyondTrust www.rapid7.com/blog/post/20...
13.02.2025 15:25 β π 5 π 6 π¬ 1 π 0
We are also publishing our AttackerKB Rapid7 analysis for CVE-2024-12356 - Unauth RCE affecting BeyondTrust PRA & RS, which was exploited in the wild last Dec as 0day ...our analysis details leveraging the new PostgreSQL vuln CVE-2025-1094 for RCE! π attackerkb.com/topics/G5s8Z...
13.02.2025 16:05 β π 1 π 2 π¬ 1 π 0
CVE-2025-1094: PostgreSQL psql SQL injection (FIXED) | Rapid7 Blog
Today Rapid7 has disclosed CVE-2025-1094, a new PostgreSQL SQLi vuln we discovered while researching CVE-2024-12356 in BeyondTrust Remote Support. Untrusted inputs that have been safely character escaped could still generate SQLi under certain conditions: www.rapid7.com/blog/post/20...
13.02.2025 16:05 β π 2 π 4 π¬ 1 π 0
Metasploit Weekly Wrap-Up 01/31/25 | Rapid7 Blog
#Metasploit weekly wrap-up: ESC4 now supported in the ldap_esc_vulnerable_cert_finder module πPlus, lots of bug fixes and usability improvements, including for LDAP and SMB login scanners, the LDAP query module, PetitPotam, and more. www.rapid7.com/blog/post/20...
03.02.2025 09:11 β π 2 π 0 π¬ 0 π 0
We now have a @metasploit-r7.bsky.social RCE exploit module in the pull queue for CVE-2024-55956 - an unauthenticated file write vulnerability affecting Cleo LexiCom, VLTrader, and Harmony which was exploited in the wild last month as 0day: github.com/rapid7/metas...
07.01.2025 20:55 β π 2 π 1 π¬ 0 π 0
Metasploit Weekly Wrap-Up 12/20/2024 | Rapid7 Blog
Belated #Metasploit wrap-up: Last week's release dished out 4 new modules, significantly better performance for database module caching, and a fix that allows customization of the User-Agent HTTP header when using Meterpreter HTTP[S] x64 payloads. Happy festive season! www.rapid7.com/blog/post/20...
26.12.2024 14:49 β π 1 π 1 π¬ 0 π 0
remmons-r7's assessment of CVE-2024-53677 | AttackerKB
CVE-2024-53677 is a flawed upload logic vulnerability in Apache Struts 2. The vulnerability permits an attacker to override internal file upload variables in aβ¦
Rapid7 analysis of Apache #Struts 2 CVE-2024-53677 here via research lead Ryan Emmons β highlights:
* No, this isn't really being successfully exploited in the wild
* Payloads need to be customized to the target
* The 'fixed' version *does not* remediate the vuln
attackerkb.com/assessments/...
18.12.2024 20:48 β π 22 π 11 π¬ 2 π 1
Metasploit Weekly Wrap-Up: 12/13/2024 | Rapid7 Blog
This weekly release includes RCEs for Moodle e-Learning platform, Primefaces, WordPress Really Simple SSL & CyberPanel along with two other modules.
It's raining RCEs in this week's #Metasploit wrap-up π§οΈ
7 new modules to help you get RCE on Primefaces, Moodle, WordPress Really Simple SSL, and CyberPanel, as well as change passwords via the LDAP and SMB protocols. www.rapid7.com/blog/post/20...
13.12.2024 22:15 β π 8 π 4 π¬ 1 π 0
Metasploit Weekly Wrap-Up 12/06/2024 | Rapid7 Blog
Big Metasploit release this week: 9 new modules to help you get RCE on Ivanti Connect Secure, VMware vCenter Server, Asterisk, Fortinet FortiManager and Acronis Cyber Protect. Plus, a WordPress account takeover, a Windows LPE, and an X11 keylogger module π
www.rapid7.com/blog/post/20...
06.12.2024 21:06 β π 2 π 1 π¬ 0 π 0
Lorex 2K Indoor Wi-Fi Security Camera: Multiple Vulns (FIXED) | Rapid7 Blog
The Lorex 2K Indoor Wi-Fi Security Camera is a cloud-based video camera for consumers. This device was a target at the 2024 Pwn2Own IoT competition.
New vuln disclosure blog, technical whitepaper, and public exploit from @stephenfewer.bsky.social on 5 CVEs he discovered and chained to get unauthenticated RCE on Lorex 2K Indoor Wi-Fi security cameras: www.rapid7.com/blog/post/20...
04.12.2024 16:40 β π 0 π 0 π¬ 0 π 0
My favourite class I teach is this 2hr intro to Metasploit why? Seeing the reactions the students have to popping a shell is ππ theyβre so happy and in shock with themselves it just warms my heart
22.11.2024 09:18 β π 31 π 1 π¬ 4 π 0
Senior Security Researcher - United Kingdom
Rapid7's vulnerability and exploit research team does industry-leading attack research that prioritizes and uncovers risk for organizations worldwide. Weβre looking for an experienced vulnerability re...
New platform, must inaugurate with a hiring post. Rapid7's vulnerability research team is expanding! Come join us if you wanna analyze (or find) some Hot Vulnsβ’, write some exploits, and occasionally reverse engineer attacks our MDR/IR folks see. Remote UK: careers.rapid7.com/jobs/senior-...
22.11.2024 02:40 β π 6 π 6 π¬ 0 π 0
Metasploit Weekly Wrap-Up 11/22/2024 | Rapid7 Blog
Roses are red, the sky is blue β
This week's #Metasploit wrap-up has Windows secrets dump improvements (and a JetBrains TeamCity login scanner, too!)
We're bad at poetry but good at shells. Check out the latest. www.rapid7.com/blog/post/20...
22.11.2024 21:01 β π 11 π 7 π¬ 0 π 0
Award winning security researcher | 7 time Microsoft MVP | Google Hall of Fame | Music and video | UK Immigration (family reunion)
https://soundcloud.com/umawing
he/him
Pentester | Red Team | Cybersecurity | Go Programmer | Cat dad
https://github.com/mortimus
Senior Principal Security Researcher at @rapid7.com. Decompiler dev for Relyze. Core Metasploit dev 2009 - 2013. MSRC Top 100 2015. Pwn2Own 2011, 2021, 2024. stephenfewer.github.io
Rapid7 can help you command your attack surface, smash silos, stay steps ahead of attackers, and take breaches from βinevitableβ to preventable. Rapid7 technology, services, and research give organizations around the world control.
π: rapid7.com
Hermetic Initiate. Exploring conscience and the nature of reality. I also hack things.
Logging into things I shouldn't.
Red Team Lead @ NVIDIA
Covering the world of cyber and intelligence from every angle.
Trend Zero Day Initiativeβ’ (ZDI) is a program designed to reward security researchers for responsibly disclosing vulnerabilities.
Security researcher in Google Project Zero. Author of Attacking Network Protocols. Posts are my own etc.
I like juggling, Bash, chess puzzles, and good exploits. Worked on Metasploit for some years. πππ©·
@egypt@mastodon.social
CEO and founder of runZero.com, previously the founder and lead developer of Metasploit, a CSO, a consultant, and the head of various security research teams. Contact info, presentations, and more at https://hdm.io/
π» Sneaky hacker by day, nap champion by night π΄ | Poppin' shells and stealing passwords π₯ | If Iβm not hackin, Iβm snoozing β both require serious skills! π₯±π₯
ζεΏ / Antiquarian @ IBM Adversary Services / Ex-TORE βοΈπ¦
/ I rewrite pointers and read memory / AI Psychoanalyst / Teaching
at labs.calypso.pub
Co-founder, security researcher. Building an attack surface management platform, @assetnote.io
She/Her. Cybersecurity Educator & Engineer. Writer. Keynote Speaker. LinkedIn Learning Author (150K+ learners). Neurospicy (ADHD). Sharing insights to inspire growth and connection. Black and proud.
Stephandsec.com
I like computering. Doing security research at @rapid7 labs.
This is a professional account. Used to play a lot of CTF with @EatSleepPwnRpt and @StratumAuhuur
Principal Security Researcher and PΓ’tissier at @codewhitesec.bsky.social