So here is the link. https://github.com/nccgroup/metasploitavevasion
Cant find anything about it on the net so i was wondering do any of you know about it, is it good and etc?
Also on the side note if i have access to my targets computer, either physical or i can get them to run a file what would be the best way to get meterpreter session running? Have looked at almost all tutorials from the last couple of years but that just created a confusion in my head.
So is this correct. Exploit is used to deliver the payload, while the payload it self can be embedded into the exploit it can be embedded into the .exe, .pdf or any other file or masked to look like a file.
Sorry for noob questions, just all of this is really fascinating and been trying to learn as much as i can. Now i know to never open links, and accept java on weird sites. Thanks in advance!
Comments
No Comments Exist
Be the first, drop a comment!