lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <439C4BF7.30402@heapoverflow.com>
Date: Sun Dec 11 15:56:04 2005
From: ad at heapoverflow.com (ad@...poverflow.com)
Subject: McAfee VirusScan vs Metasploit Framework v2.x

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I think most AV today detects any tool wich can also been used by script
kiddies remotely, mine dfind is also detected by a lot (to note the
award winning pestpatrol's detection wich find it with the md5 checksum
huhu)

Pavel Kankovsky wrote:
> On Sat, 10 Dec 2005, Debasis Mohanty wrote:
> 
> 
>>>>From: H D Moore
>>>>Looks like some overzealous idiot at McAfee added "Trojan" signatures for
>>>>202 files in the latest version of the Metasploit Framework.
>>
>>Just for the info, they have also added Nmap as "potentially unwanted
>>application" (http://vil.mcafeesecurity.com/vil/content/v_100955.htm) 
> 
> [...]
> 
> Are we making a list?
> You can add Symantec reporting a copy of Netcat as a "hacking tool".
> 
> --Pavel Kankovsky aka Peak  [ Boycott Microsoft--http://www.vcnet.com/bms ]
> "Resistance is futile. Open your source code and prepare for assimilation."
> 
> _______________________________________________
> Full-Disclosure - We believe in it.
> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> Hosted and sponsored by Secunia - http://secunia.com/
> 
> 
> 

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.2 (MingW32)
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=KP8q
-----END PGP SIGNATURE-----

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ