git-svn-id: file:///home/svn/incoming/trunk@2649 4d416f70-5f16-0410-b530-b9f4589650da
unstable
Spoon M 2005-06-15 00:02:14 +00:00
parent bf24faec72
commit fe43b129dd
1 changed files with 3 additions and 5 deletions

View File

@ -124,11 +124,10 @@
\pause \pause
\item \textbf{Post-exploitation} - Manipulating the target \item \textbf{Post-exploitation} - Manipulating the target
\begin{sitemize} \begin{sitemize}
\item Not so much the command shell itself, but what you do with it
\item Command shell redirection
\item Arbitrary command execution \item Arbitrary command execution
\item Advanced payload interaction \item Command execute via shell
\item File access, VNC, pivoting, etc \item File access, VNC, pivoting, etc
\item Advanced payload interaction
\end{sitemize} \end{sitemize}
\end{sitemize} \end{sitemize}
\end{frame} \end{frame}
@ -164,13 +163,12 @@
\item For exploits where return is uncertain \item For exploits where return is uncertain
\item Control flows through the sled into the encoder \item Control flows through the sled into the encoder
\item Generally 1 byte aligned for x86 \item Generally 1 byte aligned for x86
\item Not very common for win32 exploits
\end{sitemize} \end{sitemize}
\pause \pause
\item \textbf{Decoder} \item \textbf{Decoder}
\begin{sitemize} \begin{sitemize}
\item Complement to a payload encoder \item Synonymous with payload encoder
\item Loops and decodes payload \item Loops and decodes payload
\item Payload executed when finished \item Payload executed when finished
\end{sitemize} \end{sitemize}