Metasploit mailing list archives

fuzzing over ssl


From: mail2arthur at gmail.com (arthur)
Date: Tue, 24 Jun 2008 17:00:13 -0400

Thanks for the quick reply!! Looks I will learn a little of Ruby to get more
out of this wonderful framework :)

Arthur


Any auxiliary module that uses the Exploit::Remote::Tcp mixin could do
this, just set the SSL variable to 1 and it will negotiate SSL. Attached
is a quick template for doing this, place it into modules/auxiliary/ and
use it with the following syntax:

msf> use auxiliary/sslboom
msf auxiliary/sslboom > set RHOST target_host
msf auxiliary/sslboom > run

-HD

On Tuesday 24 June 2008, arthur wrote:
Now I can crash our tcp server by sending a 10k file (nc -c 'cat
xxx'...). However, since there is an ssl front end to accept the real
client connections so I need to test out from the front end. I think
openssl s_client should work but I also think msf may do the job better
(e.g. sending msg with some formating). Is there an auxiliary
can 1) connect using ssl, 2)then send a big message to server. Thanks.





----------------------------------------------------------------------------
----


_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework





Current thread: