-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Bryan Richardson wrote:
> So... it looks like when I make a call to exploit_simple, I get a session
> object returned back to me.  Then, in SwitchBoard, it looks like I can use
> this session object as the comm for add_route, correct?
> 
> On Wed, Feb 11, 2009 at 11:10 AM, Bryan Richardson <btri...@gmail.com>wrote:
> 
>> Hello all,
>>
>> I'm currently in the process of developing an intermediary piece of
>> software (in Ruby) to sit between Metasploit and some other software I'm
>> using.  I'm also taking this time to get a better understanding of how
>> Metasploit's internals work, as it is a fascinating Ruby software project.
>>
>> My first order of business is to figure out how I can interact with
>> Meterpreter sessions to set up pivots.  I've examined the msfcli code to see
>> how the framework, exploits, and sessions can be created and executed.
>> However, I'm having a hard time figuring out where to look in the code to
>> understand how I would go about setting up a pivot for a particular session.
>>
>> Any suggestions on where I should look?
>>
>> --
>> Thanks!
>> Bryan
>>
> 
> 
> ------------------------------------------------------------------------
> 
> _______________________________________________
> Framework-Hackers mailing list
> Framework-Hackers@spool.metasploit.com
> http://spool.metasploit.com/mailman/listinfo/framework-hackers

I'd rather code a meterpreter extension, but its a matter of choice.
And you're right, you have to look at the code.
For meterpreter issues you could check
$msf_root/external/source/meterpreter.
The code is there, and the fact that what you're intending to do is also
in ruby, is an advantage, so you can reference msf's libraries directly.
I also remember a skape's presentation describing meterpreter's protocol.
Hope this help.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)

iD8DBQFJlHDkH+KgkfcIQ8cRAn10AJ9BiwMT+7YdNfRHVUVFwpV5XoHqwgCgnFFA
GJTljcmSKGXzaUQ5AsE67kI=
=983L
-----END PGP SIGNATURE-----
_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to