![]() ![]() I also like the Mitm attack you did with a flavor of SE so the victim thinks he is installing a windows update. Its a good thing to see how another metasploit interface works. I usually turn the music off because it's loud and intrusive - but yours was entrancing and didn't detract from the content of the demonstration! I look forward to seeing more from you. It was good to see you deal with a different AV because most of the demonstrations on ST have dealt with AVG. It was a little difficult to follow in parts because of the language but I suppose that it should become clear when I follow along with an installation. Your XOR technique is similar to that shown on another video here recently. Please do not assume the authors to be same without verifying. ![]() The original author may be different from the user re-posting/linking it here. Disclaimer: We are a infosec video aggregator and this video is linked from an external website.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |