Penetration Testing mailing list archives
Re: MetaSploit Exploit Framework v1.0
From: H D Moore <hdm () digitaloffense net>
Date: Thu, 9 Oct 2003 11:29:44 -0500
Each exploit module would have to modified to use a different method of jumping to the payload, but the general architecture should still hold. Some exploits may require a custom payload to be written for the target OS (such as OpenBSD's return-to-libc-call-mprotect-trick). -HD On Thursday 09 October 2003 11:12 am, Felipe Franciosi wrote:
Do you plan adding some sort of support in order to exploit hosts running some sort of stack protection ? Would it be just a different exploit module or could it be just an option? Great work, I haven't tested it yet, but the screen shots look great. ;)
--------------------------------------------------------------------------- Tired of constantly searching the web for the latest exploits? Tired of using 300 different tools to do one job? Get CORE IMPACT and get some rest. www.coresecurity.com/promos/sf_ept2 ----------------------------------------------------------------------------
Current thread:
- MetaSploit Exploit Framework v1.0 H D Moore (Oct 06)
- Re: MetaSploit Exploit Framework v1.0 Felipe Franciosi (Oct 09)
- Re: MetaSploit Exploit Framework v1.0 H D Moore (Oct 09)
- Re: MetaSploit Exploit Framework v1.0 Felipe Franciosi (Oct 09)