Metasploit mailing list archives

MSF eXploit Builder v2 Alpha Sources Released


From: christopher.riley at r-it.at (christopher.riley at r-it.at)
Date: Wed, 29 Oct 2008 15:16:22 +0100

I think it's filter time for jerome.athias at free.fr

Chris john Riley



G.Wright at west-cheshire.ac.uk 
Gesendet von: framework-bounces at spool.metasploit.com
29.10.2008 15:09

An
jerome.athias at free.fr, framework at spool.metasploit.com
Kopie

Thema
Re: [framework] MSF eXploit Builder v2 Alpha Sources Released






Has anyone else received this an annoying amount of times now!

-----Original Message-----
From: framework-bounces at spool.metasploit.com
[mailto:framework-bounces at spool.metasploit.com] On Behalf Of Jerome
Athias
Sent: 26 October 2008 22:54
To: bugtraq at securityfocus.com; framework at spool.metasploit.com
Subject: [framework] MSF eXploit Builder v2 Alpha Sources Released

Hi folks,

Today /your mission/, /if you/ choose to /accept it/, is to download the
following sources and help me to code this sh*t!

What is the "MSF eXploit Builder"?
MSF eXploit Builder (aka MSF-XB) is an UNofficial tool to use with the
Metasploit Framework ( http://www.metasploit.com ).
MSF-eXploit Builder is a Windows GUI to build Metasploit Framework
exploit modules.
MSF-XB includes, for now, a built-in fuzzer, win32-debugger and a lot of
little tools used in the process of exploits development.
More information:
https://www.securinfos.info/metasploit/MSF_XB.php

While listening the AC/DC War machine song, I decided to release my
sources, since I work on this project for months and don't have time to
complete it correctly.
The sources of the project include part of theXploiter project.
One screenshot will more quickly describes what this project is.
https://www.securinfos.info/metasploit/theXploiter.jpg

(In few words; the main goal is to use fingerprinting/ports scanners to
obtain information on the target and use a database of matching
vulns/exploits to launch an attack against it. Some kind of MSF autopwn,
but with more granularity (ie: automatic return addresses choice based
on the OS version, SP, locale, etc of the target / use of a predefined
post-attack scenario...))

To code it, I used an IDE called WinDEV, you can use the free Express
version to open and modify the sources:
http://www.windev.com/windev/WD-Express.htm
The sources are dirty (the truth is that they're horrible) and not
reliable (come on guy, that's an alpha release!) - please send flames
off-list...
Don't hesitate to contact me directly if you want to help me on this
project.

Sources download link (86 Mb):
https://www.securinfos.info/metasploit/MSF-XB11.rar
MD5     20e658f3ba78549a9343941bc64f2a7c
SHA1    71b9509f6b183f6710b38cade9f99343930552be

Documentation (1111 pages):
https://www.securinfos.info/metasploit/MSF-XB.pdf

I salute you.
/JA

"They didn't know that it was impossible. So, they did it!"
Thanks to Isabelle - my love.
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework
_______________________________________________
http://spool.metasploit.com/mailman/listinfo/framework



----------------------------------------
Raiffeisen Informatik GmbH, Firmenbuchnr. 88239p, Handelsgericht Wien, DVR 0486809, UID ATU 16351908

Der Austausch von Nachrichten mit oben angefuehrtem Absender via E-Mail dient ausschliesslich Informationszwecken. 
Rechtsgeschaeftliche Erklaerungen duerfen ueber dieses Medium nicht ausgetauscht werden. 
Correspondence with above mentioned sender via e-mail is only for information purposes. This medium may not be used for 
exchange of legally-binding communications.
----------------------------------------




Current thread: