Take the Offensive Security - Cracking the Perimeter class
(prerequisite being Pentesting With Backtrack) - Thats where rel1k
learned it, I was sitting next to him ;-)

--
Rob Fuller | Mubix
Room362.com | Hak5.org | TheAcademyPro.com



On Tue, Dec 1, 2009 at 3:12 PM, Dimitrios Kapsalis <[email protected]> wrote:
> I'd be interested in this topic as well.
>
> On Tue, Dec 1, 2009 at 10:13 AM, Matthew Raspberry
> <[email protected]> wrote:
>>
>> Hey all,
>>
>> I was listening to Pauldotcom episode 176 when Relic was talking about
>> manually embedding payloads into executables and I was wondering if someone
>> could point me to a book or website with more information on doing that? I
>> realize Metasploit has automated the process, I would just like to know how
>> it is done. I just recently got into IT Security, coming from a Sys Admin
>> job previously, and don't know too much about the more advanced topics. Any
>> help on this is appreciated.
>>
>> --
>> Matt Raspberry
>>
>> _______________________________________________
>> Pauldotcom mailing list
>> [email protected]
>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
>> Main Web Site: http://pauldotcom.com
>
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to