[<prev] [next>] [day] [month] [year] [list]
Message-ID: <8beca820610160848j3c36dff6if0555ab8b5250d67@mail.gmail.com>
Date: Mon, 16 Oct 2006 17:48:23 +0200
From: avivra <avivra@...il.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: VoMM: Taking browser exploits to the next level
Exploits for browser vulnerabilities are here to stay.
Most security products today are using reactive methods (signatures)
to detect the specific exploit, instead of trying to detect the
general case of the vulnerability exploitation. I already demonstrated
that evading those signatures is very easy.
H.D. Moore, LMH, and I have decided to generalize the evasion methods
and package them all into one project.
Introducing: VoMM (eVade-o-Matic Module for metasploit) - Taking
browser exploits to the next level.
The purpose of this project is to create a module for Metasploit that
will take any given browser exploit and make it as undetectable as
possible.
Currently, most Anti-Viruses signatures relies on "variants". Meaning,
any little change in the malicious code is considered by the AV as a
new variant.
The VoMM project shows that this procedure cannot be applied to
browser exploits, as each exploit can have endless number of
"variants" with no change to the server side code.
http://aviv.raffon.net/2006/10/15/VoMMTakingBrowserExploitsToTheNextLevel.aspx
-- Aviv.
Powered by blists - more mailing lists