Nytro Posted August 30, 2013 Report Share Posted August 30, 2013 Metasploit - The Exploit Learning TreeAuthorMohan SantokhiThis is a whitepaper called Metasploit - The Exploit Learning Tree. Instead of being just another document discussing how to use Metasploit, the purpose of this document is to show you how to look deeper into the code and try to decipher how the various classes and modules hang together to produce the various functions.# Reference1 /documentation/developers_guide.pdf2 http://dev.metasploit.com/documents/meterpreter.pdf3 external/source/meterpreter/source/extensions/stdapi/server/railgun/railgun_manual.pdf4 www.nologin.org/Downloads/Papers/remote-library-injection.pdf5 www.nologin.org/Downloads/Papers/win32-shellcode.pdf6 Metasploit Unleashed7 http://www.securitytube.net/groups?operation=view&groupId=102 Table of Contents1 Document Control.................................................................................................................................. 21.1 Document Block ............................................................................................................................ 21.2 Change History ............................................................................................................................. 21.3 References .................................................................................................................................... 22 Table of Contents .................................................................................................................................. 33 Introduction............................................................................................................................................ 44 Setup ..................................................................................................................................................... 54.1 Getting started .................................................................................................................................... 54.2 Install Missing Gems ........................................................................................................................... 74.3 Test the environment .......................................................................................................................... 85 Exploit Metamodel ................................................................................................................................. 96 Vulnerable Service .............................................................................................................................. 117 msfconsole Initialisation Phase ............................................................................................................ 148 Use command ..................................................................................................................................... 169 Set command ...................................................................................................................................... 1810 Exploit command ................................................................................................................................. 1910.1 Create Payload Objects .................................................................................................................. 2110.2 Generate Encoded Payload ............................................................................................................ 2410.3 Start handler ................................................................................................................................... 2410.4 Exploit The Target ........................................................................................................................... 2510.5 Establish Session ............................................................................................................................ 2610.6 Interact With Target ......................................................................................................................... 2611 Meterpreter .......................................................................................................................................... 2711.1 Meterpreter payloads ...................................................................................................................... 2811.2 Client components .......................................................................................................................... 3011.2.1 UI components ............................................................................................................................. 3011.2.2 Command proxy components ....................................................................................................... 3311.3 Meterpreter Protocol ....................................................................................................................... 3511.3.1 Client side protocol API ................................................................................................................ 3511.3.2 Server side protocol API ............................................................................................................... 3711.4 Server components ......................................................................................................................... 3811.5 Server extensions ........................................................................................................................... 4112 Writing Meterpreter Extensions ............................................................................................................ 4312.1 Design commands, requests and responses ................................................................................... 4312.2 Implement skeleton extension ......................................................................................................... 4512.3 Implement command dispatcher class ............................................................................................ 4712.4 Implement command proxy class .................................................................................................... 4713 Railgun ................................................................................................................................................ 4813.1 Meterpreter scripts .......................................................................................................................... 52Download:http://packetstorm.igor.onlinedirect.bg/papers/attack/metasploit-the-learning-tree.pdfSursa: Metasploit - The Exploit Learning Tree ? Packet Storm Quote Link to comment Share on other sites More sharing options...
Maximus Posted August 30, 2013 Report Share Posted August 30, 2013 Am incercat Metasploit de cateva ori,am ramas uimit de cate poate face. Quote Link to comment Share on other sites More sharing options...
Nytro Posted August 30, 2013 Author Report Share Posted August 30, 2013 Da, pacat ca e scris in Ruby. Quote Link to comment Share on other sites More sharing options...