Take the Offensive Security - Cracking the Perimeter class (prerequisite being Pentesting With Backtrack) - Thats where rel1k learned it, I was sitting next to him ;-)
-- Rob Fuller | Mubix Room362.com | Hak5.org | TheAcademyPro.com On Tue, Dec 1, 2009 at 3:12 PM, Dimitrios Kapsalis <[email protected]> wrote: > I'd be interested in this topic as well. > > On Tue, Dec 1, 2009 at 10:13 AM, Matthew Raspberry > <[email protected]> wrote: >> >> Hey all, >> >> I was listening to Pauldotcom episode 176 when Relic was talking about >> manually embedding payloads into executables and I was wondering if someone >> could point me to a book or website with more information on doing that? I >> realize Metasploit has automated the process, I would just like to know how >> it is done. I just recently got into IT Security, coming from a Sys Admin >> job previously, and don't know too much about the more advanced topics. Any >> help on this is appreciated. >> >> -- >> Matt Raspberry >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com > > > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com > _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
