Developing a Metasploit module to exploit a network service

In this section, we will see how to make a Metasploit exploit module to exploit a given vulnerability. In this case, we will focus on a buffer overflow vulnerability of a gaming application called Crossfire. For us to write custom Metasploit modules, we need to place them in a specific directory, because when we use the use exploit /.... command in Metasploit, by default, the framework looks for the available modules in the default Metasploit exploits directory. If it doesn't find the given exploit there, it then searches the extended modules directory, which is located at the following path: /root/msf4/modules/exploits. Let's create the path and a custom directory. We'll turn our ...

Get Hands-On Penetration Testing with Python now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.