1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
|
require 'msf/core'
class Metasploit3 < Msf::Exploit::Remote
include Msf::Exploit::Remote::Tcp
def initialize(info = {})
super(update_info(info,
'Name' => 'Hackme',
'Description' => 'hackme.cs.ru.nl:2288 exploit',
'License' => MSF_LICENSE,
'Author' => ['Camil Staps'],
'Version' => '$Revision: $',
'Payload' => { 'Space' => 1400, 'BadChars' => "\x00" },
'Targets' => [ ['Automatic', {} ] ],
'Privileged' => false,
'DefaultOptions'=> { 'EXITFUNC' => 'process' },
'DefaultTarget' => 0))
register_options(
[
OptString.new('HOST', [ false, 'The host.', 'hackme.cs.ru.nl'] ),
Opt::RPORT(2288)
], self.class)
end
def exploit
connect
disconnect
end
end
|