Jump to content

dANNNlixi

Active Members
  • Posts

    4
  • Joined

  • Last visited

Posts posted by dANNNlixi

  1. Thats the same article I linked you to in the other thread. As I told you there, in that tutorial they basically just read the code in the patch and execute it step by step manually.

    What do you mean metasploit gets picked up by AV? There are tons of java attacks that aren't detected by AV's and have extremely high success rates. There are many browser based exploits mainly targeted at IE which also have extremely high success rates.

    I assume you mean that your payloads get picked up by AV's when they're on disk as a file. Despite what outdated tutorials say, almost every module in metasploit is going to be picked up by AV's. If you want to create a file that can be sent and saved locally as a file without being detected by an AV you will need to create your own. Keep researching shellcode inside of vbs. Try putting java or c inside of a .pdf without the use of metasploit. Put shellcode as a macro inside of a .doc. You should probably also try to figure out the script I already sent you - if there is an error google it.

    No one will answer this question directly because if we do then we might as well send an email to ESET asking them to add our latest payloads to their definition files.

    Very true, I guess I'm trying to cut corners.

×
×
  • Create New...