Risk
2/9/2009
08:02 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Metasploit To (Almost) Go SaaS

The Metasploit hacking tool is going the direction of many other IT security tools: it's going to be delivered, in part, as a service. But will corporate security managers upload critical data to a third party to test to see if it can be cracked?

The Metasploit hacking tool is going the direction of many other IT security tools: it's going to be delivered, in part, as a service. But will corporate security managers upload critical data to a third party to test to see if it can be cracked?We've covered, on a number of occasions, how security is increasingly being delivered as a service. Last year it was MessageLabs being acquired by Symantec, Symplified and its identity management as a service, and then there's Qualys, which launched its SaaS vulnerability management appliance at the turn of this decade.

This time, it's a step toward SaaS for the popular open source penetration-testing tool, Metasploit. As Kelly Jackson Higgins reports at DarkReading:

While this is not a pure software-as-a-services model, the new service-based features are a departure from Metasploit's software-based approach. The goal is to add back-end services, such as an "opcode" database client and a password-cracker to Metasploit, that seamlessly expand the tool's features and resources for its users, says HD Moore, creator of Metasploit. "We want our regular users to be able to take advantage of [such] services transparently," Moore says.

Sounds interesting, right? Other security vendors have been providing security through software-as-service for years. But one of the upcoming services HD Moore discussed with Kelly Jackson Higgins is in a back-end password cracking service, where a user would upload password hashes to Metasploit:

With the back-end password-cracking service, a Metasploit user could automatically submit password hashes to the Metasploit platform. "Once they are finished, [they would] get the clear-text passwords back and use those for another exploit," he says.

HD Moore says he's working to address one of the obvious problems with such services, such as criminals uploading password hashes that belong to an organization they're trying to crack into. This wouldn't be good, to say the least. One of the options he's considering as a way to stop this abuse is some type of user registration and confirmation.

But forget outright criminal abuse for a moment. Would many corporate security managers feel comfortable uploading actual password hashes to a third party? How would auditors react to learning about such practices?

I'm very curious to learn the answer to those questions.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Oh George look. Isn't that cute, They just love animal planet!
Current Issue
Five Emerging Security Threats - And What You Can Learn From Them
At Black Hat USA, researchers unveiled some nasty vulnerabilities. Is your organization ready?
Flash Poll
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7445
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

CVE-2015-4948
Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

CVE-2015-5660
Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

CVE-2015-6003
Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

CVE-2015-6333
Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
Cybercrime has become a well-organized business, complete with job specialization, funding, and online customer service. Dark Reading editors speak to cybercrime experts on the evolution of the cybercrime economy and the nature of today's attackers.