Chapter 3: The Exploit Formulation Process
Having covered the Metasploit auxiliary and post-exploitation modules, in this chapter, we will discuss exploitation aids in Metasploit. This chapter will help us to understand how built-in Metasploit utilities can improve the exploit creation process.
In this chapter, we will cover various exemplar vulnerabilities, and we will try to develop approaches and methods to exploit these vulnerabilities. However, our goal for this chapter is to build exploitation modules for Metasploit while covering a wide variety of tools.
An essential aspect of exploit writing is computer architecture. If we do not cover the basics of system architecture, we will not be able to understand how exploits work at the lower levels. Hence, we will cover the following topics in this chapter:
- The essentials of exploit development
- How built-in Metasploit functions aid exploit development and vulnerability research
- Memory corruption vulnerabilities...