- Hands-On Red Team Tactics
- Himanshu Sharma Harpreet Singh
- 119字
- 2021-08-13 15:36:43
Encoders
Encoders are used to avoid detection of a payload when it gets delivered to the target system or application. To view a list of encoders in Metasploit, we can use the following command:
Show encoders
The most well-known encoder is x86/shikata_ga_nai. This is a polymorphic XOR additive feedback encoder, which means that it generates a different output every time. It was the hardest to detect when it first came out, and it is still pretty handy when used with multiple iterations. However, iterations must be used carefully and always tested first as they may not work as expected, and after every iteration the size of the payload increases.
We will also look at some encoders in later chapters.
推薦閱讀
- ASP.NET Core 3 框架揭秘(上下冊)
- Penetration Testing with BackBox
- CSS3網(wǎng)頁設(shè)計從入門到精通(微課精編版)
- Learning SaltStack
- 計算機網(wǎng)絡
- 監(jiān)控平臺解密:IT系統(tǒng)風險感知和洞察
- 掌控你的工作!:巧用Outlook極速提升工作效率
- Apache Solr Beginner's Guide
- 阿里云云原生架構(gòu)實踐
- 信息安全測評與風險評估
- Axure RP 8 網(wǎng)站與APP原型設(shè)計
- 系統(tǒng)工程的藝術(shù):用基于模型的系統(tǒng)工程方法構(gòu)建復雜系統(tǒng)(原書第2版)
- 交互式Web前端開發(fā)實踐
- Mastering SaltStack
- 數(shù)據(jù)資產(chǎn)(第2版)