Write your own? ;-) So most of the AVs flag on the public javascript strings
that are used to exploit the vulns, so no matter if you put calc.exe in as a
payload or Sub7 you'll still flag.

However there are "other" ways to trigger them, I am told...


--
Rob Fuller | Mubix
Room362.com | Hak5.org | TheAcademyPro.com
Ignore this:
x5o...@ap[4\pzx54(P^)7CC)7}$EICAR-STANDARD-ANTIVIRUS-TEST-FILE!$H+H*



On Wed, Mar 10, 2010 at 3:41 PM, Craig Freyman <[email protected]>wrote:

> Is there a clever way to obfuscate a pdf exploit/payload? All of my nasty
> pdfs are being picked up by my AV. Looks like this will be in msfencode in
> 3.4 http://www.metasploit.com/redmine/issues/706 but wondering if there
> was a way to do it now.
>
> Thanks,
>
> -Craig
>
> _______________________________________________
> Pauldotcom mailing list
> [email protected]
> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
> Main Web Site: http://pauldotcom.com
>
_______________________________________________
Pauldotcom mailing list
[email protected]
http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom
Main Web Site: http://pauldotcom.com

Reply via email to