O'Reilly logo

Metasploit Penetration Testing Cookbook by Abhinav Singh

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Client-side Exploitation and Antivirus Bypass

In this chapter, we will cover:

  • Internet Explorer unsafe scripting misconfiguration vulnerability
  • Internet Explorer recursive call memory corruption
  • Microsoft Word RTF stack buffer overflow
  • Adobe Reader util.printf() buffer overflow
  • Generating binary and shellcode from msfpayload
  • Bypassing client-side antivirus protection using msfencode
  • Using killav.rb script to disable antivirus programs
  • A deeper look into the killav.rb script
  • Killing antivirus services from the command line

Introduction

In the previous chapter, we focused on penetration testing the target operating system. Operating systems are the first level of penetrating the target because an unpatched and outdated operating system can be easy ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required