Metasploit mailing list archives
Re: exploits for client side attacks not work
From: Rob Fuller <mubix () room362 com>
Date: Mon, 21 Jun 2010 10:39:27 -0400
AVs are flagging on the exploited function (or should be), which is the basis for the exploit. Encoding the payload a million times will not help you. You are welcome to try for yourself though. -- Rob Fuller | Mubix Room362.com | Hak5.org On Mon, Jun 21, 2010 at 9:17 AM, Spring Systems <korund () hotmail com> wrote:
PDF exploits for client side attacks not work at all, due 100% detection by AVs as exploits. This PDF will be useless unless Metasploit change payloads encoding scheme, allowing to select verious encoding options during the exploit creation. ________________________________ Hotmail is redefining busy with tools for the New Busy. Get more from your inbox. See how. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- exploits for client side attacks not work Spring Systems (Jun 21)
- Re: exploits for client side attacks not work Rob Fuller (Jun 21)
- Re: exploits for client side attacks not work Atul Agarwal (Jun 21)
- Re: exploits for client side attacks not work Spring Systems (Jun 21)
- Re: exploits for client side attacks not work Atul Agarwal (Jun 22)
- Re: exploits for client side attacks not work Atul Agarwal (Jun 21)
- Re: exploits for client side attacks not work Rob Fuller (Jun 21)