Metasploit mailing list archives
aggressive.rb
From: mmiller at hick.org (mmiller at hick.org)
Date: Tue, 16 Oct 2007 20:14:05 -0700
On Tue, Oct 16, 2007 at 09:46:20PM -0500, Samuel McIngvale wrote:
I was wondering if the source code for the service aggressive.rb exploits is available anywhere. I know I could write something, but I'm really hoping my laziness pays off. However, I was considering writing something using the tcp_server methods metasploit makes available, the only problem is I don't know how to simply execute shellcode in ruby. Any ideas as to how this works would be helpful and may stimulate me to actually write some original code.
I committed the source/binary for the test server that can be used with the test/aggressive exploit. You can find it in trunk under: documentation/samples/vulnapps/testsrv I'm not sure what you mean by the second part of your question. Ruby doesn't actually execute the shellcode, it just generates a buffer containing the shellcode and passes it over the wire to the target. The target eventually executes the shellcode.
Current thread:
- aggressive.rb Samuel McIngvale (Oct 16)
- aggressive.rb mmiller at hick.org (Oct 16)
- aggressive.rb Samuel McIngvale (Oct 17)
- aggressive.rb mmiller at hick.org (Oct 17)
- aggressive.rb Samuel McIngvale (Oct 17)
- aggressive.rb mmiller at hick.org (Oct 16)