c0d3inj3cT
12-10-2011, 06:16 PM
Here's a new video I have made to demonstrate the following:
Metasploit Browser Exploit Modules general structure.
Mozilla Firefox ReduceRight() method Vulnerability as an example.
Netcat Backdoor installation.
Techniques used to make the backdoor more persistent.
This is only a demonstration of the concept and there is a lot of scope for modification to make the attack more stealthy and bypass various security mechanisms. The general structure of the attack remains consistent with a few epilogues and prologues added.
http://vimeo.com/33442886
MetaSploit Browser Exploit and Post Exploitation Techniques on Vimeo (http://vimeo.com/33442886)
c0d3inj3cT
Metasploit Browser Exploit Modules general structure.
Mozilla Firefox ReduceRight() method Vulnerability as an example.
Netcat Backdoor installation.
Techniques used to make the backdoor more persistent.
This is only a demonstration of the concept and there is a lot of scope for modification to make the attack more stealthy and bypass various security mechanisms. The general structure of the attack remains consistent with a few epilogues and prologues added.
http://vimeo.com/33442886
MetaSploit Browser Exploit and Post Exploitation Techniques on Vimeo (http://vimeo.com/33442886)
c0d3inj3cT