Jump to content

evilgrade style exploit... swap exe with meterpreter. mitm


i8igmac
 Share

Recommended Posts

verry true. browser COOKIE=finger. I guess I was thinking fingerprint of each client lol

If finger.include?("windows")

s.puts(meterpreter.exe)

End

Just example. Above...

if anyone is interested in a team project. I made this example a few years ago... (I ment to post in community projects....)

All the code is in my head, i have no time to build this.

Packet manipulation is much needed around here

Edited by i8igmac
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

 Share

  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...