Professional Webmasters Community
Would you like to react to this message? Create an account in a few clicks or log in to continue.

Advisory To Exploit Using Metasploit

Go down

Advisory To Exploit Using Metasploit Empty Advisory To Exploit Using Metasploit

Post  andry Thu Dec 23, 2010 12:00 am

The purpose of this paper is to show the process of taking a vulnerability advisory and turning it into a working real world exploit. To show the process we will be utilizing some tools such as IDA Pro from Hex-Rays, Filemon and PipeList from Microsoft SysInternals, along with the Metasploit Framework. IDA Pro will be used to reverse engineer the application and the Metasploit Framework will be used to test and develop the exploit code. While IDA Pro is the only tool in the arsenal which is a commercial tool it is worth noting that Ollydbg or Windbg could be used for the same reverse engineering process. You could also opt to use the free version of IDA Pro 4.9 available on the Hex-Rays website.

Download PDF
andry
andry
Moderator
Moderator

Posts : 467
Join date : 2010-05-07

Back to top Go down

Back to top

- Similar topics

 
Permissions in this forum:
You cannot reply to topics in this forum