[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]
Re: Metasploit Decloak Project v2
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Roc Admin wrote:
> I just noticed that HDMoore re-released his decloak engine.
>
> http://metasploit.com/data/decloak
>
> He's improved some of the attacks from before like java, flash, and
> DNS in pretty interesting ways. There's also a test for Microsoft
> Office documents which I thought was interesting. From the page:
>
> When Microsoft Office is installed and configured to
> automatically open documents, a file can be returned which
> automatically downloads an image from the internet. This can
> bypass proxy settings and expose the real DNS servers of the user.
>
>
> It doesn't seem like there are any new attack vectors but I wanted
> to pass it along to see if anyone had comments.
>
> -ROC Tor Admin
Seems the way to guard against this is to reconfigure the DNS lookup
to execute via tor at a system level. Easily done with the network
configuration tools of Windows and Linux flavors.
Jon-
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.9 (GNU/Linux)
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org
iEYEARECAAYFAklFucoACgkQk8jp5ZVximL+fACgnTijon0ymXpas8d5EpGZ68/K
XbIAn21naTJaCf7fQ8vWTxhq1/ES7+oL
=qCXm
-----END PGP SIGNATURE-----