Importing TCP server/browser-based exploits into Metasploit
During an application test or a penetration test, we might encounter software that may fail to parse data from a request/response and end up crashing. Let's see an example of an application that has a vulnerability when parsing data:
The application used in this example is BSplayer 2.68. The vulnerability lies in parsing the remote server's response when a user tries to play a video from a URL.
When we try to stream content from the listener port of the exploit, which is 12000
, the application crashes, and instead the calculator pops up, denoting the successful exploitation of the application.
Note
Download the Python exploit for BSplayer 2.68 from https://www.exploit-db.com/exploits/36477/.
Let's see the exploit code and gather essential information from it to build the Metasploit module: