Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

metasploit "infected" items


  • Please log in to reply
4 replies to this topic

#1 sniper8752

sniper8752

  • Members
  • 385 posts
  • OFFLINE
  •  
  • Local time:01:04 AM

Posted 18 February 2013 - 05:23 PM

Are any of these  items really "malicious"?  I understand what the program does, and I got it from the official website.  

Attached Files



BC AdBot (Login to Remove)

 


#2 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:04 AM

Posted 18 February 2013 - 09:03 PM

Getting verification


Edited by boopme, 18 February 2013 - 09:03 PM.

How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#3 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:04 AM

Posted 19 February 2013 - 01:28 PM

The files detected in the text file are exploits. . . that means they are files specially crafted to take advantage of a vulnerability in software. While they are not overtly malicious. . . they act as a doorway for malicious files to be introduced to the system.  and need to go.
 


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook

#4 sniper8752

sniper8752
  • Topic Starter

  • Members
  • 385 posts
  • OFFLINE
  •  
  • Local time:01:04 AM

Posted 19 February 2013 - 01:54 PM

how could they be a doorway if my system is patched, and I am not running the program, and I got it from the right site?



#5 boopme

boopme

    To Insanity and Beyond


  • Global Moderator
  • 73,530 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:NJ USA
  • Local time:01:04 AM

Posted 19 February 2013 - 03:08 PM

What is your Adobe and Java Versions

 

CVE-2008-5499 .. http://www.naked-security.com/cve/CVE-2008-5499/

                    Unspecified vulnerability in Adobe Flash Player for Linux 10.0.12.36, and 9.0.151.0 and earlier, allows remote attackers to execute arbitrary code via a crafted SWF file.

 

http://securityvulns.com/CVE-2008-5499.html


How do I get help? Who is helping me?For the time will come when men will not put up with sound doctrine. Instead, to suit their own desires, they will gather around them a great number of teachers to say what their itching ears want to hear....Become a BleepingComputer fan: Facebook




0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users