require 'msf/core' class Metasploit3 < Msf::Exploit::Remote include Msf::Exploit::Remote::Tcp def initialize(info = {}) super(update_info(info, 'Name' => 'Hackme', 'Description' => 'hackme.cs.ru.nl:2288 exploit', 'License' => MSF_LICENSE, 'Author' => ['Camil Staps'], 'Version' => '$Revision: $', 'Payload' => { 'Space' => 1400, 'BadChars' => "\x00" }, 'Targets' => [ ['Automatic', {} ] ], 'Privileged' => false, 'DefaultOptions'=> { 'EXITFUNC' => 'process' }, 'DefaultTarget' => 0)) register_options( [ OptString.new('HOST', [ false, 'The host.', 'hackme.cs.ru.nl'] ), Opt::RPORT(2288) ], self.class) end def exploit connect disconnect end end