Chapter 16
Write Your Own Metasploit Exploits with Ruby
Chapter Objectives
After reading this chapter and completing the exercises, you will be able to do the following:
Read and understand existing Metasploit exploit source code
Modify existing Metasploit exploit source code
Create your own Metasploit exploits
This chapter is based heavily on the material in Chapter 15, “Introduction to Scripting with Ruby”. Make certain that you are completely ...
Get Penetration Testing Fundamentals: A Hands-On Guide to Reliable Security Audits now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.