Metasploit mailing list archives
Writing Exploits for MSF3
From: aushack at gmail.com (Patrick Webster)
Date: Tue, 1 May 2007 23:01:03 +1000
Hi guys, First of all congrats on the release and port of Metasploit 3! Excellent work (and you picked an awesome language to work with). I've been using msf for a few years now and would be interested in contributing where possible (though I'm no shellcode hax ninja like the rest of you). For example, if doing a pen-test and I discover a known vulnerable service where no msf module exists... is it worth writing a module? Also, I was wondering what the requirements of the modules are? E.g; stable vs unstable (100% vs 80% vs 5%) old exploits vs the new (2 years? 5 years old? windows 95 or redhat 5 attacks etc?) mainstream software vs uncommon vs rare (m$ windows / extremely expensive commercial / specialist software development company - hard to find) memory overflow vs traversal execute vs remote file read (strcpy vs ../../../bin/ls -la vs ../../etc/shadow) etc. Thanks, -Patrick -------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20070501/3ff34482/attachment.htm>
Current thread:
- Writing Exploits for MSF3 Patrick Webster (May 01)
- Writing Exploits for MSF3 H D Moore (May 01)