Mailinglist Archive


Metasploit Framework (Part Two of Three) : The Prometheus Of
From:Joe Klemmer
Date: Sun, 25 Jul 2004 23:01:22 -0400

Metasploit Framework (Part Two of Three)
The Prometheus Of Exploitation
by Pukhraj Singh and K.K. Mookhey
last updated June 16, 2004

1. Introduction
In the first part of this article series, we discussed how development
of an exploit is still a painful and time-consuming process. We
discussed the common hindrances faced during the development of exploits
and how the Metasploit Framework acts as the singular solution to these
problems. After getting a hands-on with the concepts of exploitation and
exploit framework we now move further and shed light on the internals of
the Metasploit Framework. We will look into various syntax and command
options available, the various work environments of the framework,
setting various options for exploits and running them, the addition of
new exploits, and some other advanced features of MSF.

http://www.securityfocus.com/infocus/1790

-- 
Joe Klemmer 
Unix System/Network Administrator & Ad Hoc Programmer