PaulDotCom mailing list archives

Fwd: Gonzor / Themiddler / PEScrambler


From: jd.mubix at gmail.com (Rob Fuller)
Date: Thu, 18 Dec 2008 10:05:33 -0500

Just purchased SecToolsList.com if ya'll are interested in going under that
name.

2008/12/18 Arch Angel <arch3angel at gmail.com>

I was thinking we come up with a whole new domain we can build off of,
something reflective of the culture and the community.

Any suggestions?

2008/12/18 Matt Hillman <cybereagle at gmail.com>

well i dunno if its relevant enough but i'm happy to provide a creatively
thought up subdomain of hackerslegion.com

2008/12/18 Arch Angel <arch3angel at gmail.com>

If anyone has the time to help me begin this project of creating a central
point and website for all these goodies let me know.  I can provide space,
bandwidth, and if we come up with a domain name that we all like I'll throw
in the cost of the domain name.  Once we have the domain name I can have the
access setup in a matter of minutes.

P.s. We cant use "larryisgod.org" its not fair to the other monkeys in
the zoo :-)

2008/12/17 Nathan Sweaney <NSweaney at tulsacash.com>

 if I remember correctly, the Gonzor payload was basically just a
well-written batch file that called several utilities from
http://www.nirsoft.net/.

so if you've already got a usable exploit just use the meterpreter &
copy the utilities over that you want to use.

in fact you could probably create meterpreter scripts that would do each
of the things you want more efficiently.

 ------------------------------
*From:* pauldotcom-bounces at mail.pauldotcom.com [mailto:
pauldotcom-bounces at mail.pauldotcom.com] *On Behalf Of *Noah
*Sent:* Wednesday, December 17, 2008 5:35 PM
*To:* 'PaulDotCom Security Weekly Mailing List'
*Subject:* Re: [Pauldotcom] Fwd: Gonzor / Themiddler / PEScrambler

 Hi,



While we're still talking about the Gonzor payload, has anyone had any
luck with ? or seen something similar to Gonzor for metasploit? The saved
password dumping that the Gonzor payload does would be exceptionally handy
in a pentest as a metasploit payload.



- Noah

_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com



_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com



_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com



_______________________________________________
Pauldotcom mailing list
Pauldotcom at mail.pauldotcom.com
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://mail.pauldotcom.com/pipermail/pauldotcom/attachments/20081218/fb642361/attachment.htm 


Current thread: