Metasploit mailing list archives

Walkthrough of an Exploit


From: btricha at gmail.com (Bryan Richardson)
Date: Wed, 6 May 2009 07:46:29 -0600

Thanks MaXe, I've read through both of those documents in the past, but will
do so again.  I do have extensive knowledge of Ruby, so that is a plus. :)
I also plan to use something like tracer.rb or Unroller to try and trace the
code execution.

--
Bryan

On Wed, May 6, 2009 at 1:03 AM, <metafan at intern0t.net> wrote:

I suggest you read the user and developer documentation, it gives a good
point of view how things works. Ruby knowledge is also essential because
Metasploit is written in Ruby, so if you know Ruby quite good and then read
the Metasploit Source, then i'm sure you'll understand exactly how it works
;-)

Sorry but this mail client might not send this reply correctly to the list.

Best Regards,
MaXe




Hello all,

Can anyone tell me if a walkthrough exists that describes step-by-step how
Metasploit exploits a vulnerable target and uploads a payload?  I'm talking
something very very deep in the weeds - i.e. code method calls and such.
I'd really like to understand how the Metasploit hierarchy is utilized,
when/where Metasploit gets the payloads from and uploads them, etc.  I would
say something like this is a pretty fundamental requirement for someone
interested in contributing to the framework.

--
Thanks!
Bryan

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.metasploit.com/pipermail/framework/attachments/20090506/a465b796/attachment.htm>


Current thread: