Penetration Testing mailing list archives

Metasploit encoding


From: "Mohamed Abdel Kader" <mak.pen () gmail com>
Date: Sun, 19 Mar 2006 14:17:10 +0200 (Egypt Standard Time)

Dear List,

Does anyone have some text explaining how metasploit encodes the exploits
for the below list:

 

Msf::Encoder::Countdown

Msf::Encoder::PexAlphaNum

Msf::Encoder::PexFnstenvMov

Msf::Encoder::JmpCallAdditive

Msf::Encoder::ShikataGaNai

Msf::Encoder::Alpha2

 

Thanks in advance!

Cheers

MAK

------------------------------------------------------------------------------
This List Sponsored by: Cenzic

Concerned about Web Application Security? 
As attacks through web applications continue to rise, you need to proactively 
protect your applications from hackers. Cenzic has the most comprehensive 
solutions to meet your application security penetration testing and 
vulnerability management needs. You have an option to go with a managed 
service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). 
Download FREE whitepaper on how a managed service can help you: 
http://www.cenzic.com/forms/ec.php?pubid=10025
And, now for a limited time we can do a FREE audit for you to confirm your 
results from other product. Contact us at request () cenzic com
------------------------------------------------------------------------------


Current thread: