Porting and testing the new exploit module
In the previous recipe, we learned about developing a complete exploit module for Metasploit using the available proof of concept. In this recipe, we will save the module in an appropriate location and then test it to see whether everything goes fine.
Getting ready
It is very essential to take care of the folder where we are going to store our exploit module. This can help you in keeping a track of different modules and also facilitates the framework in understanding the basic module usage. Now that you have the complete module script, let us find out an appropriate location to save it.
How to do it...
As this is an exploit module, targeting the Windows operating system which affects a particular file format, we will have to select the module location accordingly. Looking at the modules/exploits/windows
directory you can find a specific folder for fileformat
exploit modules. This is the location where we can save our module. Let us save it as galan_fileformat_bof...