May 2018
Intermediate to advanced
492 pages
10h 54m
English
This chapter is all about creating exploit modules and helping to understand how inbuilt Metasploit utilities can improve the creation process. In this chapter, we will cover various exemplar vulnerabilities, and we will try to develop approaches and methods to exploit these vulnerabilities. In addition to that, our primary focus will be on building exploit modules for Metasploit. We will also cover a wide variety of tools that will aid writing exploits in Metasploit. An essential aspect of exploit writing is the computer architecture. If we do not include the basics of the architecture, we will not be able to understand how exploits work at the lower levels. Therefore, let's first start a discussion about ...
Read now
Unlock full access