Gathering the essentials

Let's find out what essential values we need to take from the preceding exploit to generate an equivalent module in Metasploit from the following table:

Serial Number

Variables

Values

1

Offset value

2008

2

Target return/jump address/value found in executable modules using JMP ESP search

0x71AB9372

3

Target port

21

4

Number of leading NOP bytes to the shellcode to remove irregularities

10

5

Logic

The CWD command followed by junk data of 2008 bytes, followed by EIP, NOPs, and shellcode

 

We have all the information required to build a Metasploit module. In the next section, we will see how Metasploit aids FTP processes and how easy it is to create an exploit module ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.