标签为Metasploit每周总结的帖子

2 min Metasploit

Metasploit周报04/19/24

欢迎Ryan和新的CrushFTP模块 It's not every week we add an awesome new exploit module to the Framework while adding the original discoverer of the vulnerability to the Rapid7 team as well. We're very excited to welcome Ryan Emmons to the 紧急威胁响应 team, 在Rapid7与Metasploit合作. 瑞安发现了一个不合适的 Controlled Modification of Dynamically-Determined Object Attributes vulnerability in CrushFTP (CVE-2023-43177) versions prior to 10.5.1 whic

3 min Metasploit

Metasploit周报04/12/24

使用影子凭证接管帐户 The new release of Metasploit Framework includes a Shadow Credentials module 由smashery [http://github]添加.com/rapid7/metasploit-framework/pull/19051] used for reliably taking over an Active Directory user account or computer, and letting future authentication to happen as that account. 这可以被链接起来 with other modules present in Metasploit Framework such as windows_secrets_dump. Details The module targets a ‘victim’ account that is part of a

3 min Metasploit

Metasploit周报04/05/2024

新增ESC4 AD CS模板 Metasploit增加了功能 [http://docs.metasploit.com/docs/pentesting/active-directory/ad-certificates/attacking-ad-cs-esc-vulnerabilities.html] for exploiting the ESC family of flaws in AD CS in Metasploit 6.3. The ESC4 technique in particular has been supported for some time now thanks to the ad_cs_cert_templates module which enables users to read and write certificate template objects. This facilitates the exploitation of ESC4 which is a 错误配置在

3 min Metasploit

Metasploit每周总结2024年3月29日

Metasploit adds three new exploit modules including an RCE for SharePoint.

2 min Metasploit

Metasploit每周总结2024年3月22日

新增模块内容(1) OpenNMS Horizon认证RCE 作者:埃里克·温特 Type: Exploit 拉取请求:#18618 [http://github ..com/rapid7/metasploit-framework/pull/18618] erikynter [http://github]贡献.com/ErikWynter] Path: linux/http/opennms_horizon_authenticated_rce 攻击者kb参考:CVE-2023-0872 [http://attackerkb.com/search?q=CVE-2023-0872?referrer=blog] Description: This module exploits built-in functionality in OpenNMS Horizon in 命令执行任意命令,如t

2 min Metasploit

Metasploit总结2024年3月15日

新增模块内容(3) GitLab密码重置帐户接管 作者:asterion04和h00die Type: Auxiliary 拉取请求:#18716 [http://github ..com/rapid7/metasploit-framework/pull/18716] h00die [http://github]贡献.com/h00die] Path: admin/http/gitlab_password_reset_account_takeover 攻击者kb参考:CVE-2023-7028 [http://attackerkb.com/search?q=CVE-2023-7028?referrer=blog] Description: This adds an exploit module that leverages an account-take-over 要控制脆弱

3 min Metasploit

Metasploit总结:03/08/2024

新增模块内容(2) GitLab标签RSS订阅邮件披露 作者:erruquill和n00bhaxor Type: Auxiliary 拉取请求:#18821 [http://github ..com/rapid7/metasploit-framework/pull/18821] 由n00bhaxor [http://github]贡献.com/n00bhaxor] Path: gather/gitlab_tags_rss_feed_email_disclosure 攻击者kb参考:CVE-2023-5612 [http://attackerkb.com/search?q=CVE-2023-5612?referrer=blog] Description: This adds an auxiliary module that leverages an information 披露漏洞

2 min Metasploit

Metasploit每周总结2024年3月1日

Metasploit adds an RCE exploit for ConnectWise ScreenConnect and new documentation for exploiting ESC13.

4 min Metasploit

Metasploit每周总结2024年2月23日

LDAP捕获模块 Metasploit now has an LDAP capture module thanks to the work of JustAnda7 [http://github.com/JustAnda7]. 这项工作是作为…的一部分完成的 谷歌代码之夏项目. When the module runs it will by default require privileges to listen on port 389. The module implements a default implementation for BindRequest, SearchRequest, UnbindRequest, and will capture both plaintext credentials and 可以强制脱机的NTLM哈希值. 收到成功的Bin

5 min Metasploit

Metasploit每周总结2024年2月16日

New Fetch Payload It has been almost a year since Metasploit released the new fetch payloads [http://guykb.sdpeskoe.com/blog/post/2023/05/25/fetch-payloads-a-shorter-path-from-command-injection-to-metasploit-session/] and since then, 43 of the 79 exploit modules have had support for fetch payloads. The original payloads supported transferring the second stage over HTTP, HTTPS和FTP. This week, Metasploit has expanded that protocol support to include SMB, allowing payloads to be run using rundll3

2 min Metasploit

Metasploit每周总结,2024年2月9日

Go Go gadget Fortra GoAnywhere MFT模块 This Metasploit release contains a module for one of 2024's hottest 迄今为止的漏洞:CVE-2024-0204. 中的路径遍历漏洞 Fortra GoAnywhere MFT allows for unauthenticated attackers to access the InitialAccountSetup.xhtml endpoint which is used during the products initial 设置以创建第一个管理员用户. 安装完成后 端点应该不再可用. 攻击者可以利用这个 vulnerability

2 min Metasploit

Metasploit周报02/02/2024

共享RubySMB服务改进 本周的更新包括对 [http://github.com/rapid7/metasploit-framework/pull/18680] Metasploit Framework’s SMB server implementation: the SMB server can now be reused across various SMB modules, which are now able to register their own unique shares and files. SMB modules can also now be executed concurrently. 目前,有 15 SMB modules in Metasploit Framework that utilize this feature. 新增模块内容(2) 欢乐连接沙漠

5 min Metasploit

Metasploit周报01/26/24

直接系统调用支持Windows计量器 Direct system calls are a well-known technique that is often used to bypass EDR/AV detection. This technique is particularly useful when dynamic analysis is performed, where the security software monitors every process on the system to 侦测任何可疑活动. 一种常见的方法是添加用户域 hooks on Win32 API calls, especially those commonly used by malware. Direct syscalls are a way to run system calls directly and enter kernel

2 min Metasploit

Metasploit周报01/19/24

Unicode your way to a php payload and three modules to add to your playbook for Ansible Our own jheysel-r7 added an exploit leveraging the fascinating tool of php filter chaining to prepend a payload using encoding conversion characters and h00die et. al. have come through and added 3 new Ansible post modules to gather configuration information, read files, and deploy payloads. While none offer instantaneous answers across the universe, they will certainly help in red team exercises. New module

2 min Metasploit

Metasploit周报01/12/24

新增模块内容(1) Windows Gather Mikrotik Winbox "Keep Password" Credentials Extractor 作者:Pasquale 'sid' Fiorillo Type: Post 拉取请求:#18604 [http://github ..com/rapid7/metasploit-framework/pull/18604] siddolo [http://github]贡献.com/siddolo] Path: windows/gather/credentials/winbox_settings Description: This pull request introduces a new post module to extract the Mikrotik Winbox credentials, which are saved in the settings.cfg.viw file when “保留密码”选项