Metasploit Decloak Project v2

Freemor freemor at gmail.com
Mon Dec 15 02:08:45 UTC 2008


On Sun, 14 Dec 2008 18:57:18 -0600
"Roc Admin" <onionroutor at gmail.com> wrote:

> I just noticed that HDMoore re-released his decloak engine.
> 
> http://metasploit.com/data/decloak
> 
> He's improved some of the attacks from before like java, flash, and
> DNS in pretty interesting ways.  There's also a test for Microsoft
> Office documents which I thought was interesting.  From the page:
> 
> When Microsoft Office is installed and configured to automatically
> open
> > documents, a file can be returned which automatically downloads an
> > image from the internet. This can bypass proxy settings and expose
> > the real DNS servers of the user.
> 
> 
> It doesn't seem like there are any new attack vectors but I wanted to
> pass it along to see if anyone had comments.
> 
> -ROC Tor Admin

Well I must be doing something right... 
the only IP it showed for me was:

External Address 	204.13.236.244

all the rest showed as "unknown". and the above is definitely not my IP

Still good to have something to test my config against tho.
 
-- 
freemor at gmail.com
freemor at yahoo.ca

This e-mail has been digitally signed with GnuPG - ( http://gnupg.org/ )
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20081214/9ac82847/attachment.pgp>


More information about the tor-talk mailing list