Metasploit mailing list archives
How payloads (shellcodes) used in exploiting
From: jerome.athias at free.fr (Jerome Athias)
Date: Thu, 29 Mar 2007 12:34:13 +0200
Here are some resources on this subject: http://en.wikipedia.org/wiki/Metasploit_Project#Metasploit_Framework (see "encoding") http://archives.neohapsis.com/archives/sf/pentest/2006-03/0247.html http://www.hack.lu/images/0/01/Hacklu_metasploit_plugins_2006.ppt Page 35 http://metasploit.com/projects/Framework/msf3/api/rex/classes/Rex/Encoder.html The MSF documentation ... http://us.ixquick.com/eng/ Rawal, Rajesh a ?crit :
Thanks Jerome, Means to avoid badchars and for ID/PS evasion reasons, shellcodes being XORed.
Current thread:
- How payloads (shellcodes) used in exploiting Rawal, Rajesh (Mar 29)
- How payloads (shellcodes) used in exploiting Jerome Athias (Mar 29)
- How payloads (shellcodes) used in exploiting Jerome Athias (Mar 29)
- How payloads (shellcodes) used in exploiting Rawal, Rajesh (Mar 29)
- How payloads (shellcodes) used in exploiting Jerome Athias (Mar 29)
- How payloads (shellcodes) used in exploiting Jerome Athias (Mar 29)