Description: A short video which demonstrates the NOP Generators of Metasploit to evade Snort's signature based detection.
Tags: IDS evasion , Snort , Metasploit , NOP Generator , Backtrack ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Nice video. Thanks
True - the signatures suck, I guess really they need some heurustics (sp?) to properly get NOP slides etc... in the modern days. Those NOP slide rules have been around for ages, and will usually just get the PoC scripts that the kiddies download.
The polymorphic encoders seem great for this type of IDS evasion. It would be nice to see some packet fragmentation techniques as well.
Awesome video, but a LOT more explanation would be appreciated; not to sound critical, but the sort of in-depth, step-by-step approach Vivek does makes it easy to understand what exactly is happening. I was confused halfway through when you were finding open ports to www.Target.com (I thought you were scanning the retailer...).
Good demonstration, but too fast for any educational benefit from it.
Why don't use msfencode ?
what is Xminishare.py in this video?
Can I get it of every one that access to that file?