Home page logo
/

metasploit logo Metasploit mailing list archives

Re: exploits for client side attacks not work
From: Rob Fuller <mubix () room362 com>
Date: Mon, 21 Jun 2010 10:39:27 -0400

AVs are flagging on the exploited function (or should be), which is
the basis for the exploit. Encoding the payload a million times will
not help you. You are welcome to try for yourself though.



--
Rob Fuller | Mubix
Room362.com | Hak5.org



On Mon, Jun 21, 2010 at 9:17 AM, Spring Systems <korund () hotmail com> wrote:

PDF exploits for client side attacks not work at all, due 100% detection by
AVs as exploits.
This PDF will be useless unless Metasploit change payloads encoding scheme,
allowing to select verious encoding options
during the exploit creation.
________________________________
Hotmail is redefining busy with tools for the New Busy. Get more from your
inbox. See how.
_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


_______________________________________________
https://mail.metasploit.com/mailman/listinfo/framework


  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]