Metasploit Decloak Project v2
Freemor
freemor at gmail.com
Mon Dec 15 02:08:45 UTC 2008
On Sun, 14 Dec 2008 18:57:18 -0600
"Roc Admin" <onionroutor at gmail.com> wrote:
> I just noticed that HDMoore re-released his decloak engine.
>
> http://metasploit.com/data/decloak
>
> He's improved some of the attacks from before like java, flash, and
> DNS in pretty interesting ways. There's also a test for Microsoft
> Office documents which I thought was interesting. From the page:
>
> When Microsoft Office is installed and configured to automatically
> open
> > documents, a file can be returned which automatically downloads an
> > image from the internet. This can bypass proxy settings and expose
> > the real DNS servers of the user.
>
>
> It doesn't seem like there are any new attack vectors but I wanted to
> pass it along to see if anyone had comments.
>
> -ROC Tor Admin
Well I must be doing something right...
the only IP it showed for me was:
External Address 204.13.236.244
all the rest showed as "unknown". and the above is definitely not my IP
Still good to have something to test my config against tho.
--
freemor at gmail.com
freemor at yahoo.ca
This e-mail has been digitally signed with GnuPG - ( http://gnupg.org/ )
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 197 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20081214/9ac82847/attachment.pgp>
More information about the tor-talk
mailing list