Metasploit mailing list archives
Re: patchup prefix
From: HD Moore <hdm () metasploit com>
Date: Thu, 10 Dec 2009 20:31:13 -0600
On Thu, 2009-12-10 at 20:41 -0500, Jeffs wrote:
what does the "patchup" prefix mean? Or does it mean it was created by a different author from the "original" payload modules? i.e., : windows/patchupmeterpreter/reverse_tcp
There are two ways that metasploit does in-memory DLL injection, the original method, developed by skape and jt, is what we used exclusively until 2008 or so. Stephen Fewer created a new method of doing DLL injection that had a number of advantages and we gradually swapped the old method for his method, but we left the old method in the tree. The "patchup" prefix refers to the skape/jt injection method while the "defaults" are now reflective. -HD _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- nexpose_connect connection refused error..... keshav singh solanki (Dec 04)
- Re: nexpose_connect connection refused error..... HD Moore (Dec 05)
- ruby coding question Jeffs (Dec 08)
- Re: ruby coding question HD Moore (Dec 08)
- patchup prefix Jeffs (Dec 10)
- Re: patchup prefix egypt (Dec 10)
- Re: patchup prefix HD Moore (Dec 10)
- exploit -j command Jeffs (Dec 10)
- Re: exploit -j command egypt (Dec 10)
- possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- ruby coding question Jeffs (Dec 08)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 11)
- Re: nexpose_connect connection refused error..... HD Moore (Dec 05)
- Re: exploit -j command HD Moore (Dec 10)
- encoded payload question Jeffs (Dec 13)
- Re: encoded payload question MC (Dec 14)