Rhino Security Labs Blog

Posted in Research

Unitrends Vulnerability Hunting: Remote Code Execution (CVE-2017-7280) – Chapter 2

This is chapter two of a two part series on Remote Code Execution (RCE) vulnerability hunting in Unitrends. Fixes to these bugs are available in the latest Unitrends update. In chapter one of this blog series, we reviewed two simple examples of remote code execution in Unitrends Enterprise Backup appliances. In this blog we’ll detail […]

Posted in Research

Unitrends Vulnerability Hunting: Remote Code Execution (CVE-2017-7280) – Chapter 1

This is chapter one of a two part series on Remote Code Execution (RCE) vulnerability hunting in Unitrends. Fixes to these bugs are available in the latest Unitrends update. What is Unitrends? Unitrends is self-labeled as “all-in-one enterprise backup software for any IT environment,” complete with a webserver interface to manage your network. While much […]

Posted in Application Security, Penetration Testing

Username Enumeration on RSA 2017

RSA is a major information security conference in San Francisco every spring. With a tagline of “where the world talks security”, RSA is the epicenter of new infosec technologies. Yet despite the tagline, the security of the conference itself leaves attendees exposed. Through the normal registration process, Rhino Security Labs researchers identified vulnerabilities allowing an […]

Posted in Research

UNIX Nostalgia: AIX Bug Hunting Part 2 – Bellmail Privilege Escalation (CVE-2016-8972)

In our previous blog-post, we started the conversation by working with vulnerabilities which had been previously reported but were reintroduced, either by regression or incomplete patching of the respective issues. With this installment we are going to disclose a new vulnerability discovered during our initial research phase, which affects customers going back to at least […]

Posted in Research

UNIX Nostalgia: Hunting for Zeroday Vulnerabilities on IBM AIX

INTRODUCTION: During a recent network penetration test, we had stumbled upon an instance of IBM AIX running behind an important e-commerce endpoint. While much of the environment was made of Linux servers, what stood out to the team was the age of the AIX server – much older than the other systems, it was likely […]

Posted in Miscellaneous

The Newest Rhino: Bringing on Hector Monsegur

As outlined in a recent Wired article, Rhino Security Labs is proud to announce our new Assessment and Research Team lead, Hector Monsegur.  An extraordinary security researcher, Hector (once known by the Anonymous pseudonym ‘Sabu’) brings his unrivaled experience to improve the security of our clients.  A contractor for the last year, Hector was integrated […]

Posted in Network Security, Penetration Testing

Operation OwnedCloud: Exploitation and Post-exploitation Persistence

For a recent engagement Rhino Security Lab’s was recruited to assess an internal network whose predominant operating system was Windows. After running tertiary scans and audits, nothing seemed to jump out at us besides an open OwnCloud webserver. Owncloud is a private storage solution that is easy to install and customize based on your environment. […]

Posted in Information Security, Miscellaneous

Gotta Watch ’em All: Pokémon Go Permissions

  Pokémon Go is taking the world by storm. Millions of downloads and huge stock bumps have Niantic Labs as the next big company to watch in the gaming industry; however, due to a security misconfiguration by Niantic Lab’s, they may be the ones watching you. Pokémon Go is available for both iOS and Android, […]

Posted in Penetration Testing, Tools

Web Recon Tools Crash Course

Introduction Web applications are everywhere. Developers are creating new technologies at a breakneck pace, and start-ups are being created overnight with new web services. Every application is different, and because the technologies used are so diverse, it can be difficult to automate any sort of web application assessment. However many tools exist to discover hidden […]

Posted in Information Security, Tools

Security Essentials for Non-Technical Managers: Compliance vs. Security

Compliance does not equal security

Intro – Compliance Requirements and Security While industries have focused on pushing information security standards, the ever-changing threat landscape has resulted in an upsurge of breaches year-after-year. By this week alone, there have been more than 23.9% more breaches than by this time last year – exposing more than 12 million personal records. Even though […]