Metasploit mailing list archives
lucky punch
From: wullie19 at ntlworld.com (rogue)
Date: Thu, 2 Apr 2009 16:40:21 +0100
Hi there Thanks for your help. Ive been looking at XSS to redirect someone from a web page to my server to launch some sort of browser attack. So this module uses sql injection on mssql to achive that? -rogue
Rogue, What are you trying to do with the module, can you please porvide more details so i can help you better? Basically the module is used to peform thru SQL injection (MSSQL) the modification of database tables to store javascript code that may be displayed by an application to redirect the user to a compromised webserver. ET On Thu, Apr 2, 2009 at 9:37 AM, rogue <wullie19 at ntlworld.com> wrote:Hi list. Can anyone give me some info on how the auxiliary module scanner/http/lucky_punch.rb is used? Thanks -rogue _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- lucky punch rogue (Apr 02)
- lucky punch Efrain Torres (Apr 02)
- lucky punch Efrain Torres (Apr 02)
- lucky punch rogue (Apr 02)
- lucky punch rogue (Apr 02)
- lucky punch David Kennedy (Apr 02)
- lucky punch rogue (Apr 02)
- lucky punch Efrain Torres (Apr 02)
- lucky punch Efrain Torres (Apr 02)