Penetration Testing mailing list archives
Metasploit encoding
From: "Mohamed Abdel Kader" <mak.pen () gmail com>
Date: Sun, 19 Mar 2006 14:17:10 +0200 (Egypt Standard Time)
Dear List, Does anyone have some text explaining how metasploit encodes the exploits for the below list: Msf::Encoder::Countdown Msf::Encoder::PexAlphaNum Msf::Encoder::PexFnstenvMov Msf::Encoder::JmpCallAdditive Msf::Encoder::ShikataGaNai Msf::Encoder::Alpha2 Thanks in advance! Cheers MAK ------------------------------------------------------------------------------ This List Sponsored by: Cenzic Concerned about Web Application Security? As attacks through web applications continue to rise, you need to proactively protect your applications from hackers. Cenzic has the most comprehensive solutions to meet your application security penetration testing and vulnerability management needs. You have an option to go with a managed service (Cenzic ClickToSecure) or an enterprise software (Cenzic Hailstorm). Download FREE whitepaper on how a managed service can help you: http://www.cenzic.com/forms/ec.php?pubid=10025 And, now for a limited time we can do a FREE audit for you to confirm your results from other product. Contact us at request () cenzic com ------------------------------------------------------------------------------
Current thread:
- Metasploit encoding Mohamed Abdel Kader (Mar 19)
- Re: Metasploit encoding H D Moore (Mar 20)