Metasploit mailing list archives

aggressive.rb


From: mmiller at hick.org (mmiller at hick.org)
Date: Tue, 16 Oct 2007 20:14:05 -0700

On Tue, Oct 16, 2007 at 09:46:20PM -0500, Samuel McIngvale wrote:
I was wondering if the source code for the service aggressive.rb exploits is
available anywhere.  I know I could write something, but I'm really hoping
my laziness pays off.  However, I was considering writing something using
the tcp_server methods metasploit makes available, the only problem is I
don't know how to simply execute shellcode in ruby.  Any ideas as to how
this works would be helpful and may stimulate me to actually write some
original code.

I committed the source/binary for the test server that can be used with
the test/aggressive exploit.  You can find it in trunk under:

documentation/samples/vulnapps/testsrv

I'm not sure what you mean by the second part of your question.  Ruby
doesn't actually execute the shellcode, it just generates a buffer
containing the shellcode and passes it over the wire to the target.  The
target eventually executes the shellcode.



Current thread: