Chapter 4: Porting Exploits
In the previous chapter, we discussed how to write exploits in Metasploit. However, we do not need to create an exploit for a particular piece of software in a case where a public exploit is already available. A publicly available exploit might be in a different programming language such as Perl, Python, C, or others. Let's now discover some strategies for porting exploits to the Metasploit Framework from a variety of different programming languages. This mechanism enables us to transform existing exploits into Metasploit-compatible exploit modules, thus saving time and giving us the ability to switch payloads on the fly. By the end of this chapter, we will have learned about the following topics:
- Importing a stack-based buffer overflow
- Importing a Web RCE into Metasploit
- Importing a TCP server browser-based exploit into Metasploit
This idea of porting exploits into Metasploit saves time by making standalone scripts workable on...