-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Bryan Richardson wrote: > So... it looks like when I make a call to exploit_simple, I get a session > object returned back to me. Then, in SwitchBoard, it looks like I can use > this session object as the comm for add_route, correct? > > On Wed, Feb 11, 2009 at 11:10 AM, Bryan Richardson <btri...@gmail.com>wrote: > >> Hello all, >> >> I'm currently in the process of developing an intermediary piece of >> software (in Ruby) to sit between Metasploit and some other software I'm >> using. I'm also taking this time to get a better understanding of how >> Metasploit's internals work, as it is a fascinating Ruby software project. >> >> My first order of business is to figure out how I can interact with >> Meterpreter sessions to set up pivots. I've examined the msfcli code to see >> how the framework, exploits, and sessions can be created and executed. >> However, I'm having a hard time figuring out where to look in the code to >> understand how I would go about setting up a pivot for a particular session. >> >> Any suggestions on where I should look? >> >> -- >> Thanks! >> Bryan >> > > > ------------------------------------------------------------------------ > > _______________________________________________ > Framework-Hackers mailing list > Framework-Hackers@spool.metasploit.com > http://spool.metasploit.com/mailman/listinfo/framework-hackers
I'd rather code a meterpreter extension, but its a matter of choice. And you're right, you have to look at the code. For meterpreter issues you could check $msf_root/external/source/meterpreter. The code is there, and the fact that what you're intending to do is also in ruby, is an advantage, so you can reference msf's libraries directly. I also remember a skape's presentation describing meterpreter's protocol. Hope this help. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFJlHDkH+KgkfcIQ8cRAn10AJ9BiwMT+7YdNfRHVUVFwpV5XoHqwgCgnFFA GJTljcmSKGXzaUQ5AsE67kI= =983L -----END PGP SIGNATURE----- _______________________________________________ Framework-Hackers mailing list Framework-Hackers@spool.metasploit.com http://spool.metasploit.com/mailman/listinfo/framework-hackers