lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Tue, 17 Apr 2007 15:15:31 -0400
From: "srxnr srxnr" <srx.srxnr@...il.com>
To: full-disclosure@...ts.grok.org.uk
Subject: Re: ...Alright I need a little help....

> So far i've spent two days fooling around with metasploit-Like a new
> girlfriend trying her out.
> I've looked on forums, i've looked on google.
>
> So there are a few exploits written for metasploit. Now for the exploits
> written in ' .C ' for the new meatasploit doesn't work like before.
> Now it reads only ruby and or perl. So far i've looked around in my
> metasploit DIR and only found there to be .rb files.
> SO is it possible to convert a .c file to .rb so i can load it in
> metasploit.
>
> For example. This exploit '  http://milw0rm.com/exploits/3746 '
> It's came in .rar packages with a few .c files. Open'ed it with DEV C++.
> I'm guessing if i were to put down the information in for example the port
> and ip address
> and compile it, and run it would work.
>
> Am i able to convert this into a ruby file so i can load it in metasploit.
> So far i've not found a program that can do that. Maybe thats all i need if
> it's possible is a program. Or i'm also thinking that it's just not going to
> happen in metasploit and that i'm going to have to compile and run under the
> language.
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists