Metasploit mailing list archives
Re: patchup prefix
From: egypt () metasploit com
Date: Thu, 10 Dec 2009 23:10:05 -0700
That means it uses the old technique to inject a dll into the running process. It's called "patchup" because the technique hooks the normal Windows API calls and patches them to load a dll from memory instead of from a file. egypt On Thu, Dec 10, 2009 at 6:41 PM, Jeffs <jeffs () speakeasy net> wrote:
what does the "patchup" prefix mean? Or does it mean it was created by a different author from the "original" payload modules? i.e., : windows/patchupmeterpreter/reverse_tcp vs. windows/meterpreter/reverse_tcp Thanks. _______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
_______________________________________________ https://mail.metasploit.com/mailman/listinfo/framework
Current thread:
- nexpose_connect connection refused error..... keshav singh solanki (Dec 04)
- Re: nexpose_connect connection refused error..... HD Moore (Dec 05)
- ruby coding question Jeffs (Dec 08)
- Re: ruby coding question HD Moore (Dec 08)
- patchup prefix Jeffs (Dec 10)
- Re: patchup prefix egypt (Dec 10)
- Re: patchup prefix HD Moore (Dec 10)
- exploit -j command Jeffs (Dec 10)
- Re: exploit -j command egypt (Dec 10)
- possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 10)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- ruby coding question Jeffs (Dec 08)
- Re: possible bug in MSFCLI and msfencode? Thomas Werth (Dec 10)
- Re: possible bug in MSFCLI and msfencode? HD Moore (Dec 11)
- Re: nexpose_connect connection refused error..... HD Moore (Dec 05)
- Re: exploit -j command HD Moore (Dec 10)
- encoded payload question Jeffs (Dec 13)