Metasploit mailing list archives

Re: framework Digest, Vol 48, Issue 15


From: "PCanyi" <ing () pcanyi net>
Date: Wed, 1 Feb 2012 10:05:54 +0800

http://technet.microsoft.com/en-us/security/gg524265
  
 These are some words in the page as bellows:
  
This mitigation has proved to be quite effective, and even the author of the metasploit module for this vulnerability 
suggests installing EMET so it will be harder to successfully exploit the vulnerability.
 
Mandatory ASLR it just one of the six mitigations bundled with EMET version 2.0. To read more about EMET, including a 
link to the User’s Guide, please refer to this blog post. As a final note, we would like to point out that while EMET 
will minimize the risks of exploitation, it is by no means 100-percent effective and should not be considered an 
alternative for security updates and patching. Instead, EMET should be used in conjunction with other efforts to 
safeguard your environment.

  
  ------------------
  PCanyi的春天,创造开源的代码,学习深厚的知识,打破电脑的权限,共享免费的资源!


  
   
  
  ------------------ Original ------------------
  From:  "Metasploit"<framework-request () spool metasploit com>;
 Date:  Wed, Feb 1, 2012 02:00 AM
 To:  "framework"<framework () spool metasploit com>; 
 
 Subject:  framework Digest, Vol 48, Issue 15

  
Send framework mailing list submissions to
framework () spool metasploit com

To subscribe or unsubscribe via the World Wide Web, visit
https://mail.metasploit.com/mailman/listinfo/framework
or, via email, send a message with subject or body 'help' to
framework-request () spool metasploit com

You can reach the person managing the list at
framework-owner () spool metasploit com

When replying, please edit your Subject line so it is more specific
than "Re: Contents of framework digest..."


Today's Topics:

   1. against EMET? (Jun Koi)


----------------------------------------------------------------------

Message: 1
Date: Tue, 31 Jan 2012 11:34:20 +0800
From: Jun Koi <junkoi2004 () gmail com>
To: framework () spool metasploit com
Subject: [framework] against EMET?
Message-ID:
<CA+g7VZ0ugYBZWhf=gC_h9pjeUAOj8wGDHoMJhkr1b33vYVo1qg () mail gmail com>
Content-Type: text/plain; charset=ISO-8859-1

hi,

i am wondering how we are doing against EMET (running on Windows XP, for ex)?
is it true that most (or even all?) exploits in Metasploit fail against EMET?

if so, is there any plan to fix the problem?

many thanks,
Jun


------------------------------

_______________________________________________
framework mailing list
framework () spool metasploit com
https://mail.metasploit.com/mailman/listinfo/framework


End of framework Digest, Vol 48, Issue 15
*****************************************
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework

Current thread: