Let's find out what essential values we need to take from the preceding exploit to generate an equivalent module in Metasploit from the following table:
Serial Number |
Variables |
Values |
1 |
Offset value |
2008 |
2 |
Target return/jump address/value found in executable modules using JMP ESP search |
0x71AB9372 |
3 |
Target port |
21 |
4 |
Number of leading NOP bytes to the shellcode to remove irregularities |
10 |
5 |
Logic |
The CWD command followed by junk data of 2008 bytes, followed by EIP, NOPs, and shellcode |
We have all the information required to build a Metasploit module. In the next section, we will see how Metasploit aids FTP processes and how easy it is to create an exploit module ...