mailing list archives
Evilgrade 2.0 - the update explotation framework is back
From: "[ISR] - Infobyte Security Research " <noreply () infobytesec com>
Date: Fri, 29 Oct 2010 07:25:10 -0300
[ISR] - Infobyte Security Research
ISR-evilgrade | www.infobytesec.com
Infobyte Security Research is pleased to announce the release of evilgrade 2.0
with a lot of new modules and a bunch of squashed bugs.
[-] RELEASE DETAILS
Evilgrade is a modular framework that allows the user to take
advantage of poor upgrade implementations by injecting fake updates.
This framework comes into play when the attacker is able to make
traffic redirection, and such thing can be done in several ways
such as: DNS tampering, DNS Cache Poisoning, ARP spoofing
Wi-Fi Access Point impersonation, DHCP hijacking with your
This way you can easy take control of a fully patched machine
during a penetration test in a clean and easy way. The main idea
behind the is to show the amount of trivial errors in the update
process of mainstream applications.
.:: [NEW MODULES] ::.
There's a new amount of 63 modules to play with! :
.. and many more (check out the documentation for complete list)
..:: [ONLINE DEMO] ::.
Watch the framework in action, Java signed certificate bypass +
javapayload = pwnage
.:: [AUTHOR] ::.
.:: [DOWNLOAD] ::.
Get the last version over here:
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/
- Evilgrade 2.0 - the update explotation framework is back [ISR] - Infobyte Security Research (Oct 29)