Also, all the code you need to get this working. On Tue, Jan 5, 2010 at 1:35 PM, Michael McGrew <[email protected]>wrote:
> In the below issue of Hackin9 magazine they go over how to insert asm code > into a binary while keeping it's functionality fully in tact. > It specifically goes over how to insert a portion of code into putty.exe > that will send the username and password of a ssh login attempt from a > victim back to the attacker via HTTP GET prams. It's a great read. If you > cannot find the article or magazine anywhere I would be willing to scan the > article for you. > > http://hakin9.org/magazine/580-no-backdoor-try-opening-the-windows > <http://hakin9.org/magazine/580-no-backdoor-try-opening-the-windows>"Rogue > Binaries – How to Own Software" > > On Tue, Dec 1, 2009 at 8:13 AM, Matthew Raspberry < > [email protected]> wrote: > >> Hey all, >> >> I was listening to Pauldotcom episode 176 when Relic was talking about >> manually embedding payloads into executables and I was wondering if someone >> could point me to a book or website with more information on doing that? I >> realize Metasploit has automated the process, I would just like to know how >> it is done. I just recently got into IT Security, coming from a Sys Admin >> job previously, and don't know too much about the more advanced topics. Any >> help on this is appreciated. >> >> -- >> Matt Raspberry >> >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com >> > >
_______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
