Vulnerabilities / Threats

2/2/2017
04:20 PM
Connect Directly
Google+
Twitter
RSS
E-Mail
50%
50%

HD Moore Joins Research-Driven Consulting Firm

Metasploit creator joins Atredis Partners.

Metasploit creator and famed security researcher HD Moore has joined Atredis Partners, a firm that performs penetration tests and research for its clients.

Word of Moore's new position came today via an Atredis Partner's tweet: "We're excited to announce @hdmoore has joined Atredis as our VP, Research and Development. We're taking over the world, one shell at a time."

Moore has kept a relatively low profile in the past year since he left his post as chief research officer at Rapid7, where he had been since 2009. In an interview with Dark Reading today, Moore said in the past year he continued his work on the Metasploit Framework, the open source pen-testing platform, and conducted penetration-testing engagements and assisted startups.

HD Moore
Photo Source: Rapid7
HD Moore Photo Source: Rapid7

Atredis Partners - which was co-founded by three veteran security researchers formerly from Accuvant's Applied Research Team, Nathan Keltner, Shawn Moyer, and Josh Thomas - conducts penetration testing for its security assessment practice, security assessment for its embedded (think IoT, mobile, and industrial products) practice, and offers risk and advisory services.

Moore says Atredis gets "really interesting gigs," including security assessments of medical devices, drones, and even spacecraft products. "In a lot of cases, we are brought in when no tools exist yet, and so we generally then write our own tools" to assess and pen-test the products in question, Moore says.

Its clients include OEMs and resellers of a product that want to ensure the security of it, he says. Atredis then works directly with the manufacturer to remedy any security issues, for instance.

In addition to his new post at Atredis, Moore will continue his work on Metasploit as well as helping startups get off the ground.

According to Atredis' website, the firm's penetration testing team "takes a targeted, client-centric testing approach that starts with an attacker profile, industry-centric threats, and risk tolerance. We use real attack scenarios and advanced vulnerability research techniques, identifying known attack classes while also finding new zero-day vulnerabilities unique to your environment. Finally, we collaborate with you to develop a realistic mitigation strategy, aligned with your specific requirements."

Related Content:

Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
12 Free, Ready-to-Use Security Tools
Steve Zurier, Freelance Writer,  10/12/2018
Most IT Security Pros Want to Change Jobs
Dark Reading Staff 10/12/2018
6 Security Trends for 2018/2019
Curtis Franklin Jr., Senior Editor at Dark Reading,  10/15/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-10839
PUBLISHED: 2018-10-16
Qemu emulator <= 3.0.0 built with the NE2000 NIC emulation support is vulnerable to an integer overflow, which could lead to buffer overflow issue. It could occur when receiving packets over the network. A user inside guest could use this flaw to crash the Qemu process resulting in DoS.
CVE-2018-13399
PUBLISHED: 2018-10-16
The Microsoft Windows Installer for Atlassian Fisheye and Crucible before version 4.6.1 allows local attackers to escalate privileges because of weak permissions on the installation directory.
CVE-2018-18381
PUBLISHED: 2018-10-16
Z-BlogPHP 1.5.2.1935 (Zero) has a stored XSS Vulnerability in zb_system/function/c_system_admin.php via the Content-Type header during the uploading of image attachments.
CVE-2018-18382
PUBLISHED: 2018-10-16
Advanced HRM 1.6 allows Remote Code Execution via PHP code in a .php file to the user/update-user-avatar URI, which can be accessed through an "Update Profile" "Change Picture" (aka user/edit-profile) action.
CVE-2018-18374
PUBLISHED: 2018-10-16
XSS exists in the MetInfo 6.1.2 admin/index.php page via the anyid parameter.