Metasploit’s Decloak, v2

metasploit

Metasploit Decloak in back online. Decloak (v2) now identifies the real IP access of a user using a slick combo of “client-side technologies and custom services”. v2 also works regardless of the user’s proxy settings. The only public technology that it cannot get through is a PROPERLY CONFIGURED Tor+Torbutton+Privoxy setup, HDM mentions.

You can read more about it and if you haven’t already, give it a whirl.

Print Friendly, PDF & Email

Published by

jbrown

My name is Jeremy Brown, you can call me Jeremy or jbrown if you'd like. I am a security researcher currently studying communications and networking, and a decent writer/poet. I love sports, computers, and computer security. You can catch me on msn or aim, or we may meet @ your next netstat =)