Metasploit mailing list archives
Walkthrough of an Exploit
From: btricha at gmail.com (Bryan Richardson)
Date: Wed, 6 May 2009 07:46:29 -0600
Thanks MaXe, I've read through both of those documents in the past, but will do so again. I do have extensive knowledge of Ruby, so that is a plus. :) I also plan to use something like tracer.rb or Unroller to try and trace the code execution. -- Bryan On Wed, May 6, 2009 at 1:03 AM, <metafan at intern0t.net> wrote:
I suggest you read the user and developer documentation, it gives a good point of view how things works. Ruby knowledge is also essential because Metasploit is written in Ruby, so if you know Ruby quite good and then read the Metasploit Source, then i'm sure you'll understand exactly how it works ;-) Sorry but this mail client might not send this reply correctly to the list. Best Regards, MaXe Hello all, Can anyone tell me if a walkthrough exists that describes step-by-step how Metasploit exploits a vulnerable target and uploads a payload? I'm talking something very very deep in the weeds - i.e. code method calls and such. I'd really like to understand how the Metasploit hierarchy is utilized, when/where Metasploit gets the payloads from and uploads them, etc. I would say something like this is a pretty fundamental requirement for someone interested in contributing to the framework. -- Thanks! Bryan
-------------- next part -------------- An HTML attachment was scrubbed... URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090506/a465b796/attachment.htm>
Current thread:
- Walkthrough of an Exploit Bryan Richardson (May 05)
- <Possible follow-ups>
- Walkthrough of an Exploit metafan at intern0t.net (May 06)
- Walkthrough of an Exploit Bryan Richardson (May 06)