Does this actually exist? 02-17-2013, 04:45 PM
#1
Hey guys, was wondering about Metasploit and whether there are any methods of attack that don't prompt the user (ask them to download file, allow access, click link etc.) during the attack?
Eg. having all the info you'd need for an attack (IP, port scan etc.) and running an exploit against the computer that doesnt require any action on their part? Thanks!
Eg. having all the info you'd need for an attack (IP, port scan etc.) and running an exploit against the computer that doesnt require any action on their part? Thanks!
Yeah, I know. I'm guilty. I understand that. I knew it was a crime, and I did it anyways.
Shit, why argue? I'm a fucking criminal, look at me.
Shit, why argue? I'm a fucking criminal, look at me.
![[Image: haxign.jpg]](http://www.danasoft.com/sig/haxign.jpg)