Sorry, I will be picking things back up soon.
On Tumblr? Not that I know of
I've always wanted to learn the Spike fuzzing framework well enough to write my own fuzz scripts for whatever protocol I want. Although the documentation is difficult to understand and there seems to be none to very little tutorials/documentation on the web. Please help.
Added to the list of videos to do.
Kaspersky Internet Security 2010, Mcafee Security Suite, and Microsoft Security Essentials flagged all payloads as dirty.
Avast free, Avira free, and Norton Internet Security 2010 flagged none as dirty.
I hope this helps, and if you want I can send my spreadsheet covering each AV in depth as metasploit payloads weren't the only "dirty" programs that I tested.
Hope this helps!
Nice! Thanks for the info.
You don’t have to interact with a session to have it active. Why would you want to interact with a shell if you weren’t there?
I just recently got into exploits. Can you give us some insights which web pages you track for new exploits? Or in general what your main IT security "channels" are. I haven't found the right place for up-to-date information.
I get information from all over. Blogs, Twitter, OSVDB, CVEDetails, PacketStorm, Exploit-DB, Full Disclosure. You never know where that information will hit first, or if it will make a wave enough to carry over to other media. Just got to keep an eye out.