Metasploit mailing list archives
MoAxB in the MSF world: target OS detection with JavaScript
From: jerome.athias at free.fr (Jerome Athias)
Date: Mon, 21 May 2007 22:43:58 +0200
Nicob a ?crit :
Why this code ? Is it automatically created ?
yes it is
I would prefer trying "myoffset = 4116" even if the User-Agent doesn't match a known one. A vulnerable ActiveX in a customized browser should still be exploitable. Nicob
your command master! /JA
Current thread:
- MoAxB in the MSF world: target OS detection with JavaScript Jerome Athias (May 18)
- MoAxB in the MSF world: target OS detection with JavaScript Kurt Grutzmacher (May 18)
- MoAxB in the MSF world: target OS detection with JavaScript Jerome Athias (May 21)
- MoAxB in the MSF world: target OS detection with JavaScript Nicob (May 21)
- MoAxB in the MSF world: target OS detection with JavaScript Jerome Athias (May 21)
- MoAxB in the MSF world: target OS detection with JavaScript Jerome Athias (May 21)
- MoAxB in the MSF world: target OS detection with JavaScript Kurt Grutzmacher (May 18)
- <Possible follow-ups>
- MoAxB in the MSF world: target OS detection with JavaScript Mike Whitehead (May 18)
- MoAxB in the MSF world: target OS detection with JavaScript Jerome Athias (May 18)