Installation

I will be using two different systems for the example. One is a Windows XP machine (the attacker), and the other is a Windows 2000 machine (the victim). The physical network layout doesn't matter too much for this example. I used a virtualized network, but you can install the applications on one machine or have two separate computers. As far as operating systems, the victim must be a Windows 2000 machine due to the libraries used in the exploit. Once you have written the exploit, the attacking machine can run any operating system that is supported by Metasploit, which is just about everything. The choice is yours; the results will be the same.

To follow along with this chapter, you will need a fully functional installation of MSF 3.1 ...

Get Wicked Cool Ruby Scripts now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.