Summary

Covering the brain-bobbling exercises of porting exploits, we have now developed approaches to port various kinds of exploits in Metasploit. After going through this chapter, we now know that how we can port Perl, Python, and web-based exploits into the framework with ease. In this chapter, we have developed mechanisms to figure out the essentials from a standalone exploit. We saw various HTTP functions and their use in exploitation. We also refreshed our knowledge of SEH-based exploits.

So, by now, we have covered most of the exploit writing exercises. From the next chapter, we will see how we can carry out service-based testing with Metasploit and carry out penetration testing on various services such as VOIP, databases, and SCADA.

Get Mastering Metasploit now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.