The essentials of the GET/POST method

The GET method will request data or a web page from a specified resource and use it to browse web pages. On the other hand, the POST command sends the data from a form or a specific value to the resource for further processing. Now, this comes in handy when writing exploits that are web-based. The HTTP library simplifies posting particular queries or data to the specified pages.

Let's see what we need to perform in this exploit:

  1. Create a POST request
  2. Send our payload to the vulnerable application using the CODE parameter
  3. Get Meterpreter access to the target
  4. Perform a few post exploitation functions

We are clear on the tasks that we need to perform. Let's take a further step and generate a compatible ...

Get Mastering Metasploit - Third Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.