On Tue, 2009-03-10 at 16:26 -0400, Stephen Reese wrote:
> I guess my question is would it be possible to derive creating
> Metasploit exploit from the information in the second link? Are there
> more resources available than what I've mentioned above (and manual)
> for writing Metasploit exploits? I imagine a greater understanding of
> the exploitation process would help significantly but I would like to
> contribute in whatever mean necessary and I figure there are so many
> vulnerabilities disclosed on a regualar basis why not *try* to write
> some exploits for the framework...

This bug is a bit different from your standard buffer overflow, getting
code execution isn't as simple as sending a long string with a return
address and shellcode embedded. The main pre-requisite for writing
Metasploit modules is writing working exploits first; Metasploit just
makes that process a little easier. If you have a PDF which triggers
controllable EIP and a way to get your shellcode in memory, then you
could write a Metasploit module to exploit it.

-HD

_______________________________________________
Framework-Hackers mailing list
Framework-Hackers@spool.metasploit.com
http://spool.metasploit.com/mailman/listinfo/framework-hackers

Reply via email to