In the following section, we will see how we can import browser-based or TCP server-based exploits in Metasploit.
During an application test or a penetration test, we might encounter software that may fail to parse data from a request/response and end up crashing. Let's see an example of an application that has vulnerability when parsing data:
![](https://static.packt-cdn.com/products/9781788990615/graphics/assets/daa11e22-10be-4b2e-b30c-bd18c8b70ea5.png)
The application used in this example is BSplayer 2.68. We can see that we have a Python exploit listening on port 81. The vulnerability lies in parsing the remote server's response when a user tries to play a video from a URL. Let's see what happens when we try to stream content from our listener on port 81:
![](https://static.packt-cdn.com/products/9781788990615/graphics/assets/2b1085b9-2431-4831-9bde-b2add9e8e977.png)
We can see the calculator application popping up, which denotes that the exploit is working successfully.