As I'm gathering screenshots my #NorthSec presentation, I look over at my other monitor and realize just how cool #Metasploit and #Meterpreter are
#northsec #metasploit #meterpreter
OK well nice! #Metasploit has kerberos and AD modules... and nice work with #meterpreter support. Nice work @HackingDave ! You're flexing those muscles! :)
Also new in MSF 6.3: A sixth getsystem technique (EfsPotato), Mimipenguin support for better Linux credential extraction, #Metasploit datastore overhaul, customizable option specification for module authors, and #Meterpreter support for running Cobalt Strike Beacon Object Files
Weekly #Metasploit wrap-up: Python #Meterpreter updates, an adapter to run Python payloads on Windows, and a Cacti unauthenticated command injection https://www.rapid7.com/blog/post/2023/01/27/metasploit-weekly-wrap-up-190/
BOFs in meterpreter sessions
https://www.trustedsec.com/blog/operators-guide-to-the-meterpreter-bofloader/
Referenced link: https://hubs.la/Q01z2t0t0
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/TrustedSec/status/1617916890109673477#m
RT by @metasploit: In this guide from @GuhnooPlusLinux, you'll learn how the new #BOFLoader extension allows BOFs to be used from a #Meterpreter session. Discover new attacks made possible in Meterpreter and avoid common errors. https://hubs.la/Q01z2t0t0
#TrustedSec blog on using #BOF inside #meterpreter. “Operators Guide to the Meterpreter BOFLoader”
https://www.trustedsec.com/blog/operators-guide-to-the-meterpreter-bofloader/
Metasploit: Meterpreter - I have just completed this room! Check it out: https://tryhackme.com/room/meterpreter #tryhackme #security #penetration testing #Windows #meterpreter #metasploit # post-exploitation #meterpreter via @RealTryHackMe
#metasploit #meterpreter #windows #penetration #security #tryhackme
Metasploit: Meterpreter - I have just completed this room! Check it out: https://tryhackme.com/room/meterpreter #tryhackme #security #penetration testing #Windows #meterpreter #metasploit # post-exploitation #meterpreter via @RealTryHackMe
#tryhackme #security #penetration #windows #meterpreter #metasploit
Metasploit: Meterpreter - I have just completed this room! Check it out: https://tryhackme.com/room/meterpreter #tryhackme #security #penetration testing #Windows #meterpreter #metasploit # post-exploitation #meterpreter via @RealTryHackMe
#tryhackme #security #penetration #windows #meterpreter #metasploit
Remote NTLM relaying through meterpreter on Windows port 445: https://diablohorn.com/2018/08/25/remote-ntlm-relaying-through-meterpreter-on-windows-port-445/
#infosec #RedTeam #Meterpreter
#infosec #redteam #meterpreter
Running a .NET Assembly in Memory with Meterpreter: https://www.praetorian.com/blog/running-a-net-assembly-in-memory-with-meterpreter
#infosec #dotNET #Meterpreter
I remain behind on the #TryHackMe #AdventOfCode2022 challenge, but I am not giving up.
Yesterday, I completed days 15 and 16 which both focused on secure web application programming.
Day 15 uses unrestricted web uploads to pop a #Metaspoit #Meterpreter remote shell.
Day 16 focuses on #SQLInjection.and includes an integrated mitigation exercise for #PHP, which was a nice surprise.
#tryhackme #adventofcode2022 #metaspoit #meterpreter #sqlinjection #php #infosec
Originally posted by Metasploit Project / @metasploit@twitter.com: https://twitter.com/autumnwhisperz/status/1601276680357961728#m
RT by @metasploit: Just completed Day 9 of the Advent of Cyber 2022. It wasn’t easy, and there was a lot to get into! #tryhackme #infosec #kali #Linux #metasploit #meterpreter
#tryhackme #infosec #kali #linux #Metasploit #meterpreter
Fresh #Metasploit Framework release with #exploits for RCE in Gitea and VMware NSX Manager, plus payload improvements and a link to @zeroSteiner's Twitch session on writing #Python #Meterpreter commands. https://www.rapid7.com/blog/post/2022/11/18/metasploit-weekly-wrap-up-184/
#metasploit #exploits #python #meterpreter
I'm excited to share of my work that came out today! Specifically, a handful of vulnerabilities in #F5 #BIGIP devices that I worked on through the summer, and worked with the vendor to get patched (F5 was awesome to work with, btw!).
I wrote a super detailed #blog post, and also wrote a full PoC. #Metasploit modules (both for the exploits and some post-exploitation data-gathering) are incoming as well!
The most important of the issues is #RCE via a #CSRF vulnerability in the #SOAP interface (#CVE_2022_41622), which is pretty cool (though requires a confluence of conditions to actually matter). I also had to bypass #SELinux to actually exploit this on the path I chose, which is kinda cool.
The other is authenticated RCE, to which they assigned #CVE_2022_41800, though even I, the person who found it, doesn't really think it's a big deal. It's a nice way to get a #Meterpreter session on your test box, at least?
I also published a bunch of my #tools for analyzing F5, including scripts to build, parse, and #MitM requests to their proprietary (I think?) database protocol (these require a valid login to use, but there's no user separation so there's a bit of #LPE).
I'll also be speaking about this research in much more detail (as much as I can in 45 minutes :) ) in my #HushCon talk on Dec 2!
#f5 #BIGIP #blog #metasploit #rce #csrf #soap #cve_2022_41622 #selinux #cve_2022_41800 #meterpreter #tools #mitm #LPE #Hushcon
Building a bypass with MSBuild - NEWS SUMMARYLiving-off-the-land binaries (LoLBins) continue to pose a risk to security defenders.We ... more: http://feedproxy.google.com/~r/feedburner/Talos/~3/og5Kb6TOJA0/building-bypass-with-msbuild.html #livingofftheland #threatresearch #silenttrinity #cobaltstrike #meterpreter #covenant #mimikatz #lolbins #malware #msbuild
#msbuild #malware #lolbins #mimikatz #covenant #meterpreter #cobaltstrike #silenttrinity #threatresearch #livingofftheland
[Shameless Plug] Unser NetHack Video für diese Woche ist live. Heute nutzen wir Port-Forwarding in Meterpreter, greifen auf den lokalen MySQL-Dienst unseres Zielsystems zu und werfen einen Blick auf die MySQL-Logins.
#meterpreter #portforward #mysql #ethical #hacking