Back to Browse

Hacktics and Telemetry, E1: OpenClaw Risks, RCEs, and Metasploit Pro Updates

1.3K views
Mar 12, 2026
1:26:05

Welcome to the very first episode of Hacktics and Telemetry, a Rapid7 produced podcast! Hosted by Douglas McKee (fulmetalpackets) and Jonah Burgess (@_CryptoCat ), this show is your new one-stop shop for all things cybersecurity and security research. We're moving past the theory to show you exactly what is happening in the threat landscape with real examples, and leaving you with actionable advice to protect your organization. ⏱️ Episode Chapters 00:00 - Welcome to Hacktics and Telemetry 03:27 - The Situation Room: Gemini App Hacks & AI-Assisted Vuln Research 31:34 - The War Room: Secure AI Workflows with Greg Richardson 1:10:58 - Mitigation Minute: SolarWinds Help Desk RCEs & Metasploit Pro 5 Demo 🔍 Episode Highlights ● The Situation Room: We break down an incredibly creative prompt injection and data exfiltration flaw affecting the Gemini mobile app (aka "PhoneLeak"). Researchers used a CAPTCHA-style clickjacking app to force users to send prompts. To exfiltrate data (like 2FA codes) without triggering SMS confirmation, the exploit initiated phone calls and leaked the data using DTMF (Dual Tone Multi-Frequency) tones. ◦ We also discuss how AI agents like Hacktron are actively discovering new zero-days, such as the critical pre-authentication command injection RCE in BeyondTrust Remote Support (CVE-2026-1731). ● The War Room (Guest Segment): AI expert and bestselling author Greg Richardson (Global Advisory CISO at 6 Levers AI) joins us to debate the risks and rewards of autonomous AI agents like OpenClaw. ◦ Greg shares his methodology for securing AI: running agents in isolated VPS environments, restricting communication to Telegram, and tightly controlling API budgets to mitigate financial risk. ◦ His top advice for business leaders? Stop chasing shiny new tools, slow down, and focus your AI efforts on automating specific, high-value business processes. ● The Mitigation Minute (Sponsored by Rapid7 Metasploit Pro): ◦ Spencer from the Rapid7 Metasploit team walks us through newly discovered CVEs in SolarWinds Web Help Desk, which include auth bypass and deserialization RCEs (like CVE-2025-40551). ◦ We get an exclusive look at the brand-new Metasploit Pro 5 UI (releasing March 12). ◦ New features showcased include the ability to easily toggle between a "Check" and "Run" method, a convenient replay button to retain configurations, and enhanced searching using MITRE ATT&CK technique IDs. 🔗 Resources & Links Episode Stories & Research: ● PhoneLeak (Gemini Data Exfiltration via Phone Call): Read the full research by Starstrike here: https://r-7.co/3PdFluz ● BeyondTrust Remote Support RCE (CVE-2026-1731): ◦ Rapid7's Emergent Threat Response: https://r-7.co/3NySoGu ◦ Technical analysis on AttackerKB: https://r-7.co/4rt3b31 ◦ Hacktron AI's original write-up: https://r-7.co/4bpnXKX ● Rapid7's writeup on the SolarWinds Web Help Desk vulnerabilities: https://r-7.co/46XCM5X Guest Links: Follow Greg Richardson and learn more about 6 Levers AI: https://r-7.co/4cDEH3i Rapid7 Resources: ● Read the full companion blog post for this episode on the Rapid7 blog: https://r-7.co/40nmaRB ● More on Metasploit Pro 5.0.0: https://r-7.co/4sFgE8H

Download

0 formats

No download links available.

Hacktics and Telemetry, E1: OpenClaw Risks, RCEs, and Metasploit Pro Updates | NatokHD