Metasploit Framework (Part Two of Three) : The Prometheus Of | |
From: | Joe Klemmer |
Date: | Sun, 25 Jul 2004 23:01:22 -0400 |
Metasploit Framework (Part Two of Three) The Prometheus Of Exploitation by Pukhraj Singh and K.K. Mookhey last updated June 16, 2004 1. Introduction In the first part of this article series, we discussed how development of an exploit is still a painful and time-consuming process. We discussed the common hindrances faced during the development of exploits and how the Metasploit Framework acts as the singular solution to these problems. After getting a hands-on with the concepts of exploitation and exploit framework we now move further and shed light on the internals of the Metasploit Framework. We will look into various syntax and command options available, the various work environments of the framework, setting various options for exploits and running them, the addition of new exploits, and some other advanced features of MSF. http://www.securityfocus.com/infocus/1790 -- Joe KlemmerUnix System/Network Administrator & Ad Hoc Programmer