Metasploit mailing list archives
Re: Exploits for fully patched Windows systems
From: rhyskidd at gmail.com (Rhys Kidd)
Date: Sun, 30 Sep 2007 21:51:03 +0800
@Thorsten I'm under no uncertainty that some individuals have private Metasploit based exploits or auxiliary modules that may well target fully Microsoft patched systems. For those who have the skill/tools/time to find and analyze a remote code execution or DoS issue, using Metasploit's API and pre-built protocol stacks makes enormous sense. Of course, having created such vulnerability intellectual property, not all are willing to immediately pass it on to the MSF dev's. I'm not trying to increase my "0day"-sensationalism-whorage, rather it's a matter of reality. - Rhys -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070930/dfde03dd/attachment.htm>
Current thread:
- Exploits for fully patched Windows systems Thorsten Kampe (Sep 28)
- Exploits for fully patched Windows systems Thierry Zoller (Sep 29)
- Exploits for fully patched Windows systems Nicob (Sep 29)
- Exploits for fully patched Windows systems Donnie Werner (Sep 29)
- Re: Exploits for fully patched Windows systems Thorsten Kampe (Sep 29)
- Re: Exploits for fully patched Windows systems Rhys Kidd (Sep 30)
- Re: Exploits for fully patched Windows systems Thorsten Kampe (Sep 29)
- <Possible follow-ups>
- Exploits for fully patched Windows systems Rohit Srivastwa (Sep 29)